Title:Arbitrary File Upload File Upload Vulnerability in php-traditional-server v1.2.2
The code in endpoint.php allows file uploads and doesn't check if the users authenticated or the file type.  This allows for executable files to be uploaded and therefore remote code execution. 

Lines 37-38 from endpoint.php:

37: // Specify the list of valid extensions, ex. array("jpeg", "xml", "bmp")
38: $uploader->allowedExtensions = array(); // all files types allowed by default
https://github.com/lcashdol/Exploits/tree/master/CVE-2018-9209