Submit #707865: code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Uploadinfo

Titelcode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload
BeschreibungThe affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php) Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible.
Quelle⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md
Benutzer
 Yohane-Mashiro (UID 92825)
Einreichung06.12.2025 14:58 (vor 5 Monaten)
Moderieren13.12.2025 09:36 (7 days later)
StatusAkzeptiert
VulDB Eintrag336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image erweiterte Rechte]
Punkte20

Interested in the pricing of exploits?

See the underground prices here!