We found results for “”
WS-2022-0427
Good to know:
Date: November 2, 2022
thorsten/phpmyfaq prior to 3.1.9 is vulnerable to SQL injection via the lang parameter of phpmyfaq/ajaxservice.php?action=savefaq endpoint. It is able to bypass faqLanguage whitelisting by specifying a rubrik POST parameter. The impact depends on the database engine used. For MySQL database engine - this vulnerability is not that devastating since MySQL PHP adapter forbids stacked queries. However, when using PostgreSQL as a back-end, it may lead to Remote Code Execution . which
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
SQL Injection
CWE-89Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |