Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-48vw-jpf8-hwqh

Опубликовано: 25 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.1

Описание

phpMyFAQ Stored HTML Injection at contentLink

Summary

Due to insufficient validation on the contentLink parameter, it is possible for unauthenticated users to inject HTML code to the page which might affect other users. Also, requires that adding new FAQs is allowed for guests and that the admin doesn't check the content of a newly added FAQ.

PoC

  1. Browse to ../phpmyfaq/index.php?action=add&cat=0 , enter https://test.com?p=<h1>HTML_INJECTION</h1> for the contentLink parameter. image

  2. Verify the HTML injection by viewing the FAQ itself, “All categories” → “CategoryName” → ”QuestionName”. image

Impact

Attackers can manipulate the appearance and functionality of web pages by injecting malicious HTML code. This can lead to various undesirable outcomes, such as defacing the website, redirecting users to malicious sites, or altering the content to deceive users. Additionally, unauthenticated HTML injection can compromise user privacy by displaying sensitive information or misleading content. It undermines the integrity of the application and erodes user trust, potentially resulting in loss of reputation and credibility.

Пакеты

Наименование

phpmyfaq/phpmyfaq

composer
Затронутые версииВерсия исправления

= 3.2.5

3.2.6

EPSS

Процентиль: 70%
0.00628
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-79
CWE-80

Связанные уязвимости

CVSS3: 4.7
nvd
почти 2 года назад

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Due to insufficient validation on the `contentLink` parameter, it is possible for unauthenticated users to inject HTML code to the page which might affect other users. _Also, requires that adding new FAQs is allowed for guests and that the admin doesn't check the content of a newly added FAQ._ This vulnerability is fixed in 3.2.6.

CVSS3: 4.7
fstec
почти 2 года назад

Уязвимость параметра contentLink веб-приложения phpMyFAQ, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

EPSS

Процентиль: 70%
0.00628
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-79
CWE-80