Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mmh6-5cpf-2c72

Опубликовано: 25 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 3.8

Описание

phpMyFAQ Path Traversal in Attachments

Summary

There is a Path Traversal vulnerability in Attachments that allows attackers with admin rights to upload malicious files to other locations of the web root.

PoC

  1. In settings, the attachment location is vulnerable to path traversal and can be set to e.g ..\hacked image

  2. When the above is set, attachments files are now uploaded to e.g C:\Apps\XAMPP\htdocs\hacked instead of C:\Apps\XAMPP\htdocs\phpmyfaq\attachments

  3. Verify this by uploading an attachment and see that the "hacked" directory is now created in the web root folder with the attachment file inside. image image

Impact

Attackers can potentially upload malicious files outside the specified directory.

Пакеты

Наименование

phpmyfaq/phpmyfaq

composer
Затронутые версииВерсия исправления

= 3.2.5

3.2.6

EPSS

Процентиль: 64%
0.00463
Низкий

3.8 Low

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 3.8
nvd
почти 2 года назад

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. There is a Path Traversal vulnerability in Attachments that allows attackers with admin rights to upload malicious files to other locations of the web root. This vulnerability is fixed in 3.2.6.

EPSS

Процентиль: 64%
0.00463
Низкий

3.8 Low

CVSS3

Дефекты

CWE-22