icon

We found results for “

WS-2022-0427

Good to know:

icon

Date: November 2, 2022

thorsten/phpmyfaq prior to 3.1.9 is vulnerable to SQL injection via the lang parameter of phpmyfaq/ajaxservice.php?action=savefaq endpoint. It is able to bypass faqLanguage whitelisting by specifying a rubrik POST parameter. The impact depends on the database engine used. For MySQL database engine - this vulnerability is not that devastating since MySQL PHP adapter forbids stacked queries. However, when using PostgreSQL as a back-end, it may lead to Remote Code Execution . which

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-89

Top Fix

icon

Upgrade Version

Upgrade to version phpmyfaq/phpmyfaq - 3.0.10;phpmyfaq/phpmyfaq - 3.1.2;phpmyfaq/phpmyfaq - 3.1.9;phpmyfaq/phpmyfaq - 3.0.0-alpha.3;phpmyfaq/phpmyfaq - dev-master-symfony2;phpmyfaq/phpmyfaq - dev-main;thorsten/phpmyfaq - dev-master-symfony2;thorsten/phpmyfaq - 3.1.9;thorsten/phpmyfaq - dev-main

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us