Vulnerable-Web-Application/FileUpload/fileupload2.php

41 lines
1.2 KiB
PHP
Raw Normal View History

2018-11-29 22:02:53 +00:00
<!DOCTYPE html>
<html>
<body>
2018-11-30 00:02:46 +00:00
<div style="background-color:#c9c9c9;padding:15px;">
<button type="button" name="homeButton" onclick="location.href='../homepage.html';">Home Page</button>
<button type="button" name="mainButton" onclick="location.href='fileupl.html';">Main Page</button>
</div>
<div align="center">
2018-11-29 22:02:53 +00:00
<form action="" method="post" enctype="multipart/form-data">
Select image ->
<input type="file" name="file" id="file">
<hr>
<input type="submit" value="Submit" name="submit">
</form>
2018-11-30 00:02:46 +00:00
</div>
2018-11-29 22:02:53 +00:00
<?php
// Check if image file is a actual image or fake image
if(isset($_POST["submit"])) {
$target_dir = "uploads/";
$target_file = $target_dir . basename($_FILES["file"]["name"]);
$uploadOk = 1;
$imageFileType = strtolower(pathinfo($target_file,PATHINFO_EXTENSION));
$type = $_FILES["file"]["type"];
if($type != "image/png" && $type != "image/jpeg" ){
echo "JPG, JPEG, PNG & GIF files are allowed.";
$uploadOk = 0;
}
if($uploadOk == 1){
move_uploaded_file($_FILES["file"]["tmp_name"], $target_file);
echo "File uploaded /uploads/".$_FILES["file"]["name"];
}
}
?>
</body>
</html>