提交 #707865: code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload信息

标题code-projects.org Computer Laboratory System In PHP With Source Code 1.0 Unrestricted Upload
描述The affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php) Moreover, the application does not enforce any whitelist for allowed file types. As a result, an attacker can upload arbitrary files, including malicious PHP scripts, which will be accessible and executable on the server if the uploads directory is web-accessible.
来源⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%203.md
用户
 Yohane-Mashiro (UID 92825)
提交2025-12-06 14時58分 (5 月前)
管理2025-12-13 09時36分 (7 days later)
状态已接受
VulDB条目336374 [code-projects Computer Laboratory System 1.0 admin/admin_pic.php image 权限提升]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!