Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-28106
HistoryMar 25, 2024 - 6:41 p.m.

CVE-2024-28106 phpMyFAQ Stored XSS at FAQ News Content

2024-03-2518:41:58
CWE-79
GitHub_M
github.com
4
cve-2024-28106
phpmyfaq
stored xss
faq news
javascript code
vulnerability
fixed
version 3.2.6
post request

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L

AI Score

6.2

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*"
    ],
    "vendor": "phpmyfaq",
    "product": "phpmyfaq",
    "versions": [
      {
        "status": "affected",
        "version": "3.2.5"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L

AI Score

6.2

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-28106