Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-28107
HistoryMar 25, 2024 - 6:47 p.m.

CVE-2024-28107 phpMyFAQ SQL injections at insertentry & saveentry

2024-03-2518:47:12
CWE-89
GitHub_M
github.com
3
phpmyfaq
sql injection
insertentry
saveentry
php 8.1+
mysql
postgresql
vulnerability
data exfiltration
account takeover
rce
3.2.6 fix

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the insertentry & saveentry when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:thorsten:phpmyfaq:*:*:*:*:*:*:*:*"
    ],
    "vendor": "thorsten",
    "product": "phpmyfaq",
    "versions": [
      {
        "status": "affected",
        "version": "3.25"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-28107