提交 #334216: SourceCodester SchoolWebTech V1.0 Unrestricted Upload信息

标题SourceCodester SchoolWebTech V1.0 Unrestricted Upload
描述The input obtained through PHP in line 375 of the \ improve \ home.php file is used by PHP in line 375 to determine the location of the file to be written, which may allow attackers to modify or damage the content of the file, or create a brand new file. zebra11 found that the file upload operation was triggered in /improve/home.php, and the _FAILE variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE.
来源⚠️ https://github.com/CveSecLook/cve/issues/30
用户
 zebra11 (UID 68838)
提交2024-05-14 17時51分 (2 年前)
管理2024-05-15 21時19分 (1 day later)
状态已接受
VulDB条目264534 [SourceCodester SchoolWebTech 1.0 /improve/home.php image 权限提升]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!