إرسال #707865: code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Uploadالمعلومات

عنوانcode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload
الوصفThe affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php) Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible.
المصدر⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md
المستخدم
 Yohane-Mashiro (UID 92825)
ارسال06/12/2025 02:58 PM (5 أشهر منذ)
الاعتدال13/12/2025 09:36 AM (7 days later)
الحالةتمت الموافقة
إدخال VulDB336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image تجاوز الصلاحيات]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!