We found results for “”
WS-2022-0432
Good to know:
Date: November 4, 2022
There is a SQL injection vulnerability inside saveMeta function in AttachmentAbstract.php in thorsten/phpmyfaq prior to 3.1.9. When a file is being uploaded via admin/index.php?action=ajax&ajax=att&ajaxaction=upload endpoint, the filename parameter isn't being sanitized and its later on interpolated into a raw SQL query inside saveMeta method.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89Top Fix
Upgrade Version
Upgrade to version thorsten/phpmyfaq - dev-main;thorsten/phpmyfaq - 3.1.9;phpmyfaq/phpmyfaq - dev-snyk-fix-6a9cf43a8fc92d6d608c7e5595d1e588;phpmyfaq/phpmyfaq - 3.1.2;phpmyfaq/phpmyfaq - 3.0.10;phpmyfaq/phpmyfaq - 3.1.9;phpmyfaq/phpmyfaq - 3.0.0-alpha.3
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


