You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
+In line 14 of the 'profile.php' file, the input obtained through '$_FILES' is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
Impact
Attackers can exploit this vulnerability for unrestricted uploads, which may result in file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also lead to RCE
Description
'Lime' found that the file upload operation was received by the variable '$_FILES' in the 'profile.php' file. Due to the lack of proper input validation and cleaning, remote attackers can pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
Vulnerability details and POC
Payload
POC screenshot
I successfully executed the PHP script on the terminal
The text was updated successfully, but these errors were encountered:
Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 profile.php Unrestricted Upload
NAME OF AFFECTED PRODUCT(S)
Vendor Homepage
AFFECTED AND/OR FIXED VERSION(S)
submitter
Vulnerable File
VERSION(S)
Software Link
PROBLEM TYPE
Vulnerability Type
Root cause
+In line 14 of the 'profile.php' file, the input obtained through '$_FILES' is directly used to determine the storage location of the file without verification or cleaning. The specific code snippet is as follows:
Impact
Description
Vulnerability details and POC
Payload
POC screenshot
I successfully executed the PHP script on the terminal
The text was updated successfully, but these errors were encountered: