Lucene search

K
githubGitHub Advisory DatabaseGHSA-MMH6-5CPF-2C72
HistoryMar 25, 2024 - 7:35 p.m.

phpMyFAQ Path Traversal in Attachments

2024-03-2519:35:09
CWE-22
GitHub Advisory Database
github.com
8
phpmyfaq
path traversal
attachments
admin rights
malicious files
uploads

CVSS3

3.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

10.5%

Summary

There is a Path Traversal vulnerability in Attachments that allows attackers with admin rights to upload malicious files to other locations of the web root.

PoC

  1. In settings, the attachment location is vulnerable to path traversal and can be set to e.g …\hacked
    image

  2. When the above is set, attachments files are now uploaded to e.g C:\Apps\XAMPP\htdocs\hacked instead of C:\Apps\XAMPP\htdocs\phpmyfaq\attachments

  3. Verify this by uploading an attachment and see that the “hacked” directory is now created in the web root folder with the attachment file inside.
    image
    image

Impact

Attackers can potentially upload malicious files outside the specified directory.

Affected configurations

Vulners
Node
phpmyfaqphpmyfaqMatch3.2.5
VendorProductVersionCPE
phpmyfaqphpmyfaq3.2.5cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*

CVSS3

3.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

10.5%

Related for GHSA-MMH6-5CPF-2C72