Project: Github Paroxyste/Simply-Blog 20190102

Vulnerability: #9224528 (2019-01-02 06:08:03)

Warning

There are many false positives, or unexploitable vulnerabilities. Please create working "PoC" exploit before reporting anything to vendor!

Details:

Sink Standard::move_uploaded_file
Risk _FILES
/Simply-Blog-master/admin/editPost.php:17 (show/hide source)
1  <?php
2  
3  require_once("../includes/database.php");
4  require_once("../includes/sessions.php");
5  require_once("../includes/functions.php");
6  
7  $Admin = "Laurent Echeverria";
8  
9  if(isset($_POST["submit"])) {
10  	$Title = mysqli_real_escape_string($Connection, $_POST["Title"]);
11  	$Category = mysqli_real_escape_string($Connection, $_POST["Category"]);
12    $Post = mysqli_real_escape_string($Connection, $_POST["Post"]);
13  	$CurrentTime = time();
14  	$DateTime = date('d M Y', $CurrentTime);
15  	$DateTime;
16  	$Image = $_FILES["Image"]["name"];
17 $Target = "../assets/img/uploads/" . basename($_FILES["Image"]["name"]);
18 $SearchQueryParam = $_GET["edit"]; 19
Threat level 0

Callstack:

@INLINE::/Simply-Blog-master/admin/editPost.php /Simply-Blog-master/admin/editPost.php:32 (show/hide source)
12    $Post = mysqli_real_escape_string($Connection, $_POST["Post"]);
13  	$CurrentTime = time();
14  	$DateTime = date('d M Y', $CurrentTime);
15  	$DateTime;
16  	$Image = $_FILES["Image"]["name"];
17  	$Target = "../assets/img/uploads/" . basename($_FILES["Image"]["name"]);
18    $SearchQueryParam = $_GET["edit"];
19  
20  	if(empty($Title) || empty($Category) || empty($Image) || empty($Post))  {
21  		$_SESSION["ErrorMessage"] = "All Fileds Are Required !";
22  		Redirect_to("editPost.php?edit={$SearchQueryParam}");
23  	} elseif(strlen($Title) < 5 || strlen($Post) < 50) {
24  		$_SESSION["ErrorMessage"] = "You must write more characters";
25  		Redirect_to("editPost.php?edit={$SearchQueryParam}");
26  	} else {
27      $EditFromURL = $_GET["edit"];
28  		$Query = "UPDATE admin_panel SET datetime='$DateTime', title='$Title', category='$Category',
29                author='$Admin', image='$Image', post='$Post' WHERE id='$EditFromURL'";
30  		
31  		$Execute = mysqli_query($Connection, $Query);
32 move_uploaded_file($_FILES["Image"]["tmp_name"], $Target);
33 34 if($Execute) {