Súbít #417583: Codezips Online Shopping Portal In PHP With Source Code-2 V1.0 Unrestricted Uploadbayani

KuraCodezips Online Shopping Portal In PHP With Source Code-2 V1.0 Unrestricted Upload
Gaskiya'polaris0x1' discovered that the file upload operation was triggered on line 80 of the 'update-image1.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). Attackers can exploit this vulnerability for unrestricted uploads, which may lead to file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also result in RCE
Manga⚠️ https://github.com/ppp-src/CVE/issues/7
Màdùmga
 polaris0x1 (UID 67906)
Furta10/03/2024 18:01 (1 Shettima 전)
Gargajiya10/10/2024 09:25 (7 days later)
HalittaShingilam
VulDB gite279947 [Codezips Online Shopping Portal 1.0 /update-image1.php productimage1 kura hakki ndiyam]
Nganji20

Interested in the pricing of exploits?

See the underground prices here!