| शीर्षक | code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload |
|---|
| विवरण | The affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user:
move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]);
No checks are performed on:
File extension
MIME type
File content
File name safety
Double extensions (e.g., shell.php.jpg)
Directory traversal attempts (../../shell.php)
Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible. |
|---|
| स्रोत | ⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md |
|---|
| उपयोगकर्ता | Yohane-Mashiro (UID 92825) |
|---|
| सबमिशन | 06/12/2025 02:58 PM (5 महीनों पहले) |
|---|
| संयम | 13/12/2025 09:36 AM (7 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image अधिकार वृद्धि] |
|---|
| अंक | 20 |
|---|