| 标题 | itsourcecode Online Food Ordering System Project in PHP with Source Code V1.0 Unrestricted Upload |
|---|
| 描述 | In line 8 of the editproduct.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning. Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
N3xu5Cr4ck37 discovered that the file upload operation was triggered on line 80 of the 'editproduct.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). |
|---|
| 来源 | ⚠️ https://github.com/L1OudFd8cl09/CVE/blob/main/25_07_2024_a.md |
|---|
| 用户 | N3xu5Cr4ck37 (UID 69573) |
|---|
| 提交 | 2024-07-25 17時46分 (2 年前) |
|---|
| 管理 | 2024-07-28 09時13分 (3 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 272610 [itsourcecode Online Food Ordering System 1.0 editproduct.php photo 权限提升] |
|---|
| 积分 | 20 |
|---|