Impact
The flaw allows an attacker to upload any file type, including executable code, through the image parameter in the doInsert function of controller.php. This lack of file type validation (CWE-434) and improper authorization controls (CWE-284) can enable the attacker to place malicious files on the server, potentially leading to remote code execution or other serious compromise. The vulnerability is publicly documented and demonstrated to be reachable remotely.
Affected Systems
The affected products are SourceCodester Resort Reservation System version 1.0 and janobe Resort Reservation System version 1.0. Both are under the same code base and share the same vulnerability.
Risk and Exploitability
The CVSS base score of 5.3 indicates a moderate severity. The EPSS score is less than 1%, suggesting that hardware or software exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog. The attack requires remote manipulation of the image argument but does not mention authentication, implying that an unauthenticated attacker could exploit the issue. Hence, while the risk is moderate, the overall exploitation probability is low.
OpenCVE Enrichment