An Arbitrary File Upload in SourceCodester Online Library Management System 1.0 allows remote code execution
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2020-28130 | 22 May 202515:26 | – | redhatcve |
![]() | CVE-2020-28130 | 17 Nov 202020:17 | – | cvelist |
![]() | Design/Logic Flaw | 17 Nov 202021:15 | – | prion |
![]() | SourceCodester Online Library Management System Command Injection (CVE-2020-28130) | 1 Dec 202000:00 | – | checkpoint_advisories |
![]() | CVE-2020-28130 | 17 Nov 202021:15 | – | nvd |
Source | Link |
---|---|
sourcecodester | www.sourcecodester.com/php/14545/online-library-management-system-phpmysqli-full-source-code-2020.html |
exploit-db | www.exploit-db.com/exploits/48928 |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
view | query param | /admin/borrower/index.php | Endpoint exploited to trigger remote code execution after an arbitrary file is uploaded. | CWE-434 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo