Lucene search

K
githubGitHub Advisory DatabaseGHSA-GMJJ-G2RM-XWM7
HistoryApr 05, 2023 - 6:30 p.m.

thorsten/phpmyfaq vulnerable to cross-site scripting (XSS) via stopword parameter

2023-04-0518:30:18
CWE-79
GitHub Advisory Database
github.com
8
thorsten
phpmyfaq
cross-site scripting
xss
vulnerability
stopword parameter
software
security

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

33.2%

thorsten/phpmyfaq prior to 3.1.12 is vulnerable to cross-site scripting (XSS) because it fails to sanitize user input in the stopword parameter. This has been fixed in 3.1.12.

Affected configurations

Vulners
Node
thorstenphpmyfaqRange<3.1.12
VendorProductVersionCPE
thorstenphpmyfaq*cpe:2.3:a:thorsten:phpmyfaq:*:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

33.2%