You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
+In line 19 of the '/pages/save_user.php' file, the input obtained through '$_FILES' is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
Impact
Attackers can exploit this vulnerability for unrestricted uploads, which may result in file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also lead to RCE
Description
'Tiki' found that the file upload operation was received by the variable '$_FILES' in the '/pages/save_user.php' file. Due to the lack of proper input validation and cleaning, remote attackers can pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
Vulnerability details and POC
Payload
POC screenshot
I successfully executed the PHP script on the terminal
The text was updated successfully, but these errors were encountered:
Charlotte008
changed the title
Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 update-image1.php Unrestricted Upload
Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 /pages/save_user.php Unrestricted Upload
Nov 3, 2024
Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 update-image1.php Unrestricted Upload
NAME OF AFFECTED PRODUCT(S)
Vendor Homepage
AFFECTED AND/OR FIXED VERSION(S)
submitter
Vulnerable File
VERSION(S)
Software Link
PROBLEM TYPE
Vulnerability Type
Root cause
+In line 19 of the '/pages/save_user.php' file, the input obtained through '$_FILES' is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
Impact
Description
Vulnerability details and POC
Payload
POC screenshot
I successfully executed the PHP script on the terminal
The text was updated successfully, but these errors were encountered: