Lucene search

K
githubGitHub Advisory DatabaseGHSA-4CR4-X82X-HWM9
HistoryApr 05, 2023 - 6:30 p.m.

thorsten/phpmyfaq vulnerable to authentication bypass

2023-04-0518:30:18
CWE-294
GitHub Advisory Database
github.com
10
thorsten
phpmyfaq
vulnerability
authentication bypass
capture-relay
comments
software

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.8%

thorsten/phpmyfaq prior to 3.1.12 is vulnerable to authentication bypass by capture-relay that allows unlimited comments to be sent. This has been fixed in 3.1.12.

Affected configurations

Vulners
Node
thorstenphpmyfaqRange<3.1.12
CPENameOperatorVersion
thorsten/phpmyfaqlt3.1.12

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.8%