We found results for “”
WS-2022-0427
Good to know:
Date: November 2, 2022
thorsten/phpmyfaq prior to 3.1.9 is vulnerable to SQL injection via the lang parameter of phpmyfaq/ajaxservice.php?action=savefaq endpoint. It is able to bypass faqLanguage whitelisting by specifying a rubrik POST parameter. The impact depends on the database engine used. For MySQL database engine - this vulnerability is not that devastating since MySQL PHP adapter forbids stacked queries. However, when using PostgreSQL as a back-end, it may lead to Remote Code Execution . which
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89Top Fix
Upgrade Version
Upgrade to version phpmyfaq/phpmyfaq - 3.0.10;phpmyfaq/phpmyfaq - 3.1.2;phpmyfaq/phpmyfaq - 3.1.9;phpmyfaq/phpmyfaq - 3.0.0-alpha.3;phpmyfaq/phpmyfaq - dev-master-symfony2;phpmyfaq/phpmyfaq - dev-main;thorsten/phpmyfaq - dev-master-symfony2;thorsten/phpmyfaq - 3.1.9;thorsten/phpmyfaq - dev-main
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


