Отправить #707865: code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted UploadИнформация

Названиеcode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload
ОписаниеThe affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php) Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible.
Источник⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md
Пользователь
 Yohane-Mashiro (UID 92825)
Представление06.12.2025 14:58 (5 месяцы назад)
Модерация13.12.2025 09:36 (7 days later)
Статуспринято
Запись VulDB336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image эскалация привилегий]
Баллы20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!