| Название | projectworlds Advanced Library Management System 1.0 SQL Injection |
|---|
| Описание | Discovered that the file upload operation was triggered of the 'add_librarian.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). |
|---|
| Источник | ⚠️ https://github.com/1Opera/vul/blob/main/report.md |
|---|
| Пользователь | zhangmengxia (UID 92310) |
|---|
| Представление | 04.11.2025 12:08 (6 месяцы назад) |
|---|
| Модерация | 16.11.2025 18:23 (12 days later) |
|---|
| Статус | Дубликат |
|---|
| Запись VulDB | 332588 [projectworlds Advanced Library Management System 1.0 /add_librarian.php Имя пользователя SQL-инъекция] |
|---|
| Баллы | 0 |
|---|