提出 #436520: Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 SQL Injection情報

タイトルCodezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 SQL Injection
説明'Lime' found that the file upload operation was received by the variable '$_FILES' in the 'profile.php' file. Due to the lack of proper input validation and cleaning, remote attackers can pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).Attackers can exploit this vulnerability for unrestricted uploads, which may result in file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also lead to RCE
ソース⚠️ https://github.com/hbuzs/CVE/issues/1
ユーザー
 Lime (UID 77066)
送信2024年11月03日 11:20 (1 年 ago)
モデレーション2024年11月04日 10:48 (23 hours later)
ステータス承諾済み
VulDBエントリ282952 [Codezips Online Institute Management System 迄 1.0 /profile.php old_image 特権昇格]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!