| タイトル | projectworlds Advanced Library Management System V1.0 Unrestricted Upload |
|---|
| 説明 | discovered that the file upload operation was triggered of the 'add_book.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). |
|---|
| ソース | ⚠️ https://github.com/GYSakura/tmp75/blob/main/report.md |
|---|
| ユーザー | GYSakura (UID 92303) |
|---|
| 送信 | 2025年11月20日 15:06 (5 月 ago) |
|---|
| モデレーション | 2025年11月23日 08:40 (3 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 333337 [projectworlds can pass malicious payloads 迄 1.0 /add_book.php image 特権昇格] |
|---|
| ポイント | 20 |
|---|