Show filters
126 Total Results
Displaying 11-20 of 126
Sort by:
Attacker Value
Unknown
CVE-2024-27299
Disclosure Date: March 25, 2024 (last updated January 12, 2025)
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the "Add News" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. The vulnerable field lies in the `authorEmail` field which uses PHP's `FILTER_VALIDATE_EMAIL` filter. This filter is insufficient in protecting against SQL injection attacks and should still be properly escaped. However, in this version of phpMyFAQ (3.2.5), this field is not escaped properly can be used together with other fields to fully exploit the SQL injection vulnerability. This vulnerability is fixed in 3.2.6.
0
Attacker Value
Unknown
CVE-2024-24574
Disclosure Date: February 05, 2024 (last updated February 13, 2024)
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
0
Attacker Value
Unknown
CVE-2024-22208
Disclosure Date: February 05, 2024 (last updated February 13, 2024)
phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5.
0
Attacker Value
Unknown
CVE-2024-22202
Disclosure Date: February 05, 2024 (last updated February 14, 2024)
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ's user removal page allows an attacker to spoof another user's detail, and in turn make a compelling phishing case for removing another user's account. The front-end of this page doesn't allow changing the form details, an attacker can utilize a proxy to intercept this request and submit other data. Upon submitting this form, an email is sent to the administrator informing them that this user wants to delete their account. An administrator has no way of telling the difference between the actual user wishing to delete their account or the attacker issuing this for an account they do not control. This issue has been patched in version 3.2.5.
0
Attacker Value
Unknown
CVE-2023-6890
Disclosure Date: December 16, 2023 (last updated February 08, 2024)
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.
0
Attacker Value
Unknown
CVE-2023-6889
Disclosure Date: December 16, 2023 (last updated February 08, 2024)
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.
0
Attacker Value
Unknown
CVE-2023-5867
Disclosure Date: October 31, 2023 (last updated November 08, 2023)
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
0
Attacker Value
Unknown
CVE-2023-5866
Disclosure Date: October 31, 2023 (last updated November 09, 2023)
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1.
0
Attacker Value
Unknown
CVE-2023-5865
Disclosure Date: October 31, 2023 (last updated November 10, 2023)
Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
0
Attacker Value
Unknown
CVE-2023-5864
Disclosure Date: October 31, 2023 (last updated November 08, 2023)
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1.
0