CVE-2026-0577
📋 TL;DR
CVE-2026-0577 is an unrestricted file upload vulnerability in code-projects Online Product Reservation System 1.0. Attackers can remotely upload malicious files via the /handgunner-administrator/prod.php endpoint, potentially leading to server compromise. All deployments of version 1.0 are affected.
💻 Affected Systems
- code-projects Online Product Reservation System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover via webshell upload leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Webshell installation allowing persistent backdoor access, data exfiltration, or use as a pivot point for further attacks.
If Mitigated
Limited impact with proper file upload validation and web application firewall rules blocking malicious uploads.
🎯 Exploit Status
Public proof-of-concept exploit code is available, making exploitation trivial for attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch is available. Consider upgrading to a different product or implementing workarounds.
🔧 Temporary Workarounds
Restrict file uploads via web server configuration
allBlock access to the vulnerable endpoint or restrict file uploads to specific extensions
# Apache: Add to .htaccess
<Files "prod.php">
Order Allow,Deny
Deny from all
</Files>
# Nginx: Add to server block
location ~ /handgunner-administrator/prod\.php$ {
deny all;
return 403;
}
Implement file upload validation
allAdd server-side validation to restrict file types, extensions, and content
# Example PHP validation snippet
$allowed_extensions = ['jpg', 'png', 'pdf'];
$file_extension = strtolower(pathinfo($_FILES['file']['name'], PATHINFO_EXTENSION));
if (!in_array($file_extension, $allowed_extensions)) {
die('Invalid file type');
}
🧯 If You Can't Patch
- Isolate the system on a separate network segment with strict firewall rules
- Implement a web application firewall (WAF) with file upload protection rules
🔍 How to Verify
Check if Vulnerable:
Check if /handgunner-administrator/prod.php exists and accepts file uploads without proper validation
Check Version:
Check the software version in the application interface or configuration files
Verify Fix Applied:
Test file upload functionality with malicious files to ensure they are rejected
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /handgunner-administrator/prod.php
- Uploads of executable files (php, exe, etc.)
- Multiple failed upload attempts
Network Indicators:
- POST requests to /handgunner-administrator/prod.php with file uploads
- Unusual outbound connections from the web server
SIEM Query:
source="web_logs" AND uri="/handgunner-administrator/prod.php" AND method="POST" AND size>1000000
🔗 References
- https://code-projects.org/
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/file_upload_prod.php.md
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/file_upload_prod.php.md#poc
- https://vuldb.com/?ctiid.339461
- https://vuldb.com/?id.339461
- https://vuldb.com/?submit.731015