إرسال #358592: itsourcecode Magbanua’s Beach Resort Online Reservation System V1.0 Unrestricted Uploadالمعلومات

عنوانitsourcecode Magbanua’s Beach Resort Online Reservation System V1.0 Unrestricted Upload
الوصفlaster discovered that the file upload operation was triggered on line 157 of the 'controller.php' file and the uploaded file was received using the '$-FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). In line 157 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning.
المصدر⚠️ https://github.com/Laster-dev/CVE/issues/1
المستخدم
 laster (UID 70008)
ارسال17/06/2024 03:46 PM (2 سنوات منذ)
الاعتدال18/06/2024 07:49 AM (16 hours later)
الحالةتمت الموافقة
إدخال VulDB268856 [itsourcecode Magbanua Beach Resort Online Reservation System حتى 1.0 controller.php image تجاوز الصلاحيات]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!