files := r.MultipartForm.File["upload"]
for _, file := range files {
src, err := file.Open()
filename := fmt.Sprintf("%d%s", imgNum, filepath.Ext(file.Filename))
dst, err := os.Create(ORIGINAL_DIR + "/" + filename)
_, err = io.Copy(dst, src)
Hmmm... can an attacker upload a file named "../../../etc/profile.d/script.sh" or similar ideas, i.e. path traversal?