You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In line 13 of the change_profile_picture.php file,The input obtained through $- FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows:
Impact
Attackers can exploit this vulnerability to upload malicious files without restriction, which can lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Exploiting malicious files can lead to remote attacks on RCE
DESCRIPTION
The file upload operation was triggered on line 13 of the "change_profile_picture.php" file, and the uploaded file was received using the "$- FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload
NAME OF AFFECTED PRODUCT(S)
Vendor Homepage
AFFECTED AND/OR FIXED VERSION(S)
submitter
Vulnerable File
VERSION(S)
Software Link
PROBLEM TYPE
Vulnerability Type
Root Cause
Impact
DESCRIPTION
Vulnerability details and POC
I successfully executed the PHP script on the terminal
The text was updated successfully, but these errors were encountered: