Submeter #707865: code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Uploadinformação

Títulocode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload
DescriçãoThe affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php) Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible.
Fonte⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md
Utilizador
 Yohane-Mashiro (UID 92825)
Submissão06/12/2025 14h58 (há 5 meses)
Moderação13/12/2025 09h36 (7 days later)
EstadoAceite
Entrada VulDB336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image Elevação de Privilégios]
Pontos20

Interested in the pricing of exploits?

See the underground prices here!