You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 6, 2018. It is now read-only.
A security researcher discovered that an authenticated user (including a newly registered guest) could import a Zip file containing framework data. Although the extracted Zip file data is not stored in the web server document root, symbolic links created during the web app installation for "test_data" allow for PHP execution.
Steps to Reproduce
Important: Make sure to use a test account when reproducing these steps!
Export the DaytonaSampleFramework to a zip file under the user dropdown box -> Import/Export page.
Add a PHP file to the Zip archive as test.php in the DaytonaSampleFramework directory.
Import the Zip archive under the Import/Export page.
A security researcher discovered that an authenticated user (including a newly registered guest) could import a Zip file containing framework data. Although the extracted Zip file data is not stored in the web server document root, symbolic links created during the web app installation for "test_data" allow for PHP execution.
Steps to Reproduce
Important: Make sure to use a test account when reproducing these steps!
DaytonaSampleFramework
to a zip file under the user dropdown box -> Import/Export page.test.php
in the DaytonaSampleFramework directory.Import/Export
page.The text was updated successfully, but these errors were encountered: