🚨 Vulnerable File Upload

This upload endpoint has NO security controls:

Dangerous Test Cases:

1. Web Shell Upload:

Create a file named: shell.php
Content: <?php system($_GET['cmd']); ?>

2. Directory Traversal:

Filename: ../../../evil.txt
Overwrites files outside upload directory

3. Configuration Overwrite:

Filename: ../../.env
Could overwrite environment variables

4. Large File DoS:

Upload very large files to consume disk space

How to fix: