|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
[2009-05-20 11:24 UTC] danymoussa at gmail dot com
[2009-05-20 11:33 UTC] carsten_sttgt at gmx dot de
[2009-05-20 11:37 UTC] danymoussa at gmail dot com
[2009-05-20 11:45 UTC] carsten_sttgt at gmx dot de
[2009-05-20 12:28 UTC] jani@php.net
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Fri Dec 19 19:00:01 2025 UTC |
Description: ------------ This is a very serious problem that i never faced in php earlier version. However i tried to hack into my jpg-upload-image script and was able to do that by inserting a renamed shell script: pic1.php.jpg Reproduce code: --------------- <form action="upload.php" method="post" enctype="multipart/form-data"> <input type="file" name="file"> <input type="submit" value="Upload"> </form> print_r($_FILES); Expected result: ---------------- [file] => Array ( [name] => pic.php.jpg [type] => image/jpeg [tmp_name] => /tmp/php96MEPH [error] => 0 [size] => 23052 ) Actual result: -------------- [file] => Array ( [name] => pic.php.jpg [type] => application/octet-stream [tmp_name] => /tmp/php96MEPH [error] => 0 [size] => 23052 )