Логотип exploitDog
bind:CVE-2024-27299
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-27299

Количество 3

Количество 3

nvd логотип

CVE-2024-27299

почти 2 года назад

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the "Add News" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. The vulnerable field lies in the `authorEmail` field which uses PHP's `FILTER_VALIDATE_EMAIL` filter. This filter is insufficient in protecting against SQL injection attacks and should still be properly escaped. However, in this version of phpMyFAQ (3.2.5), this field is not escaped properly can be used together with other fields to fully exploit the SQL injection vulnerability. This vulnerability is fixed in 3.2.6.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-qgxx-4xv5-6hcw

почти 2 года назад

phpMyFAQ SQL Injection at "Save News"

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2024-02348

почти 2 года назад

Уязвимость функции Add News веб-приложения phpMyFAQ, позволяющая нарушителю получить несанкционированный доступ к приложению

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-27299

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the "Add News" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. The vulnerable field lies in the `authorEmail` field which uses PHP's `FILTER_VALIDATE_EMAIL` filter. This filter is insufficient in protecting against SQL injection attacks and should still be properly escaped. However, in this version of phpMyFAQ (3.2.5), this field is not escaped properly can be used together with other fields to fully exploit the SQL injection vulnerability. This vulnerability is fixed in 3.2.6.

CVSS3: 8.8
2%
Низкий
почти 2 года назад
github логотип
GHSA-qgxx-4xv5-6hcw

phpMyFAQ SQL Injection at "Save News"

CVSS3: 8.8
2%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02348

Уязвимость функции Add News веб-приложения phpMyFAQ, позволяющая нарушителю получить несанкционированный доступ к приложению

CVSS3: 8.8
2%
Низкий
почти 2 года назад

Уязвимостей на страницу