提出 #707865: code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload情報

タイトルcode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload
説明The affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php) Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible.
ソース⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md
ユーザー
 Yohane-Mashiro (UID 92825)
送信2025年12月06日 14:58 (5 月 ago)
モデレーション2025年12月13日 09:36 (7 days later)
ステータス承諾済み
VulDBエントリ336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image 特権昇格]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!