Home / Vulnerability Database / PHP : Unsafe file upload
PHP
PHP : Unsafe file upload
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
CWE
Overview
The application receives a file attached to a SOAP-message. This can be exploited to upload malicious data or code to the server.
If users can upload files to a publicly accessible directory, an attacker can use this for remote execution of malicious code on the server.
LOW
DerScanner Severity Score
Do you want to fix PHP : Unsafe file upload in your application?
See also
PHP
PHP : Null salt
PHP
PHP : Empty password
PHP
