Submit #707865: code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Uploadinfo

Titlecode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload
DescriptionThe affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php) Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible.
Source⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md
User
 Yohane-Mashiro (UID 92825)
Submission12/06/2025 14:58 (5 months ago)
Moderation12/13/2025 09:36 (7 days later)
StatusAccepted
VulDB entry336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image unrestricted upload]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!