Home / Vulnerability Database / PHP : Unsafe file upload
PHP

PHP : Unsafe file upload

Classification

OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0

Overview

The application receives a file attached to a SOAP-message. This can be exploited to upload malicious data or code to the server.

If users can upload files to a publicly accessible directory, an attacker can use this for remote execution of malicious code on the server.

LOW

DerScanner Severity Score

Do you want to fix PHP : Unsafe file upload in your application?

See also

PHP

PHP : Null salt

PHP

PHP : Empty password

PHP

PHP : Empty salt