提出 #287775: keerti1924 Online-Book-Store-Website 1.0 1.0 Arbitrary File Upload情報

タイトルkeerti1924 Online-Book-Store-Website 1.0 1.0 Arbitrary File Upload
説明The 'product_update.php' script in keerti1924's Online-Book-Store-Website is vulnerable to Arbitrary File Upload, posing a severe security risk. An authenticated admin user can exploit this flaw to upload malicious files, potentially leading to remote code execution or other security breaches. By uploading a crafted PHP file, attackers can execute arbitrary code on the server, compromising the system's integrity. Remediation involves implementing strict input validation and file upload restrictions, allowing only authorized file types and enforcing proper file permissions. Additionally, implementing file upload scanning and validation mechanisms can help detect and prevent the upload of malicious files.
ソース⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md
ユーザー
 nochizplz (UID 64302)
送信2024年02月25日 16:41 (2 年 ago)
モデレーション2024年03月07日 15:35 (11 days later)
ステータス承諾済み
VulDBエントリ256038 [keerti1924 Online-Book-Store-Website 1.0 product_update.php?update=1 update_image 特権昇格]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!