An unauthenticated file upload vulnerability has been identified in admin/gallery.php in PHPGurukul Job Portal 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
                
            References
                    | Link | Resource | 
|---|---|
| https://tib3rius.com/cves.html | Third Party Advisory | 
| https://www.exploit-db.com/exploits/47881 | Third Party Advisory VDB Entry | 
| https://tib3rius.com/cves.html | Third Party Advisory | 
| https://www.exploit-db.com/exploits/47881 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 04:55
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://tib3rius.com/cves.html - Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/47881 - Third Party Advisory, VDB Entry | 
Information
                Published : 2020-03-08 23:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10225
Mitre link : CVE-2020-10225
CVE.ORG link : CVE-2020-10225
JSON object : View
Products Affected
                phpgurukul
- job_portal
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
