1 vulnerabilities classified as CWE-616 (上传文件变量的不完整标识(PHP)). AI Chinese analysis included.
CWE-616 represents a critical input validation weakness in PHP applications that rely on legacy file upload handling mechanisms. This vulnerability arises when developers directly reference global variables, such as $varname or $varname_name, which are automatically populated by the PHP engine upon file submission. Attackers typically exploit this flaw by manipulating HTTP requests, including POST data, cookies, or headers, to overwrite these sensitive global variables. By injecting malicious filenames or MIME types, adversaries can trick the application into processing unauthorized files, potentially leading to remote code execution or file inclusion attacks. To mitigate this risk, developers must avoid using these deprecated global variables entirely. Instead, they should utilize the secure $_FILES superglobal array, which provides a controlled and validated interface for accessing uploaded file metadata, thereby ensuring that file attributes cannot be tampered with through external request manipulation.
$varname = name of the temporary file on local machine $varname_size = size of file $varname_name = original name of file provided by client $varname_type = MIME type of the file$_FILES['userfile']['name'] - original filename from client $_FILES['userfile']['tmp_name'] - the temp filename of the file on the server| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-52305 | UnoPim Stored XSS : Cookie hijacking through Create User function — unopim | 6.5 | Medium | 2024-11-13 |
Vulnerabilities classified as CWE-616 (上传文件变量的不完整标识(PHP)) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.