phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. An attacker with admin privileges can upload an attachment containing JS code without extension and the application will render it as HTML which allows for XSS attacks.
References
Link | Resource |
---|---|
https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9 | Exploit Vendor Advisory |
https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9 | Exploit Vendor Advisory |
Configurations
History
09 Jan 2025, 16:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9 - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
First Time |
Phpmyfaq phpmyfaq
Phpmyfaq |
|
CPE | cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:* |
Information
Published : 2024-03-25 21:15
Updated : 2025-01-09 16:59
NVD link : CVE-2024-29179
Mitre link : CVE-2024-29179
CVE.ORG link : CVE-2024-29179
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')