提出 #698646: projectworlds Advanced Library Management System V1.0 Unrestricted Upload情報

タイトルprojectworlds Advanced Library Management System V1.0 Unrestricted Upload
説明discovered that the file upload operation was triggered of the 'add_book.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
ソース⚠️ https://github.com/GYSakura/tmp75/blob/main/report.md
ユーザー
 GYSakura (UID 92303)
送信2025年11月20日 15:06 (5 月 ago)
モデレーション2025年11月23日 08:40 (3 days later)
ステータス承諾済み
VulDBエントリ333337 [projectworlds can pass malicious payloads 迄 1.0 /add_book.php image 特権昇格]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!