提交 #707866: ode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Incomplete Identification of Uploaded File Variables信息

标题ode-projects.org Computer Laboratory System In PHP With Source Code 1.0 Incomplete Identification of Uploaded File Variables
描述Product and Version Affected Product Name: Computer Laboratory System In PHP With Source Code Affected File: admin/admin_pic.php Detailed Description The affected code handles administrator profile image uploads without performing any security validations. When the user submits an image, the application directly moves the uploaded file to the uploads/ directory using the original filename provided by the user: move_uploaded_file($_FILES["image"]["tmp_name"], "uploads/" . $_FILES["image"]["name"]); No checks are performed on: File extension MIME type File content File name safety Double extensions (e.g., shell.php.jpg) Directory traversal attempts (../../shell.php)
来源⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/upload%204.md
用户
 Yohane-Mashiro (UID 92825)
提交2025-12-06 14時59分 (5 月前)
管理2025-12-13 09時36分 (7 days later)
状态已接受
VulDB条目336375 [code-projects Computer Laboratory System 1.0 technical_staff_pic.php image 权限提升]
积分20

Want to know what is going to be exploited?

We predict KEV entries!