Lucene search

K
githubGitHub Advisory DatabaseGHSA-R69V-Q48G-3966
HistoryApr 30, 2023 - 3:30 a.m.

phpMyFAQ Improper Access Control vulnerability

2023-04-3003:30:26
CWE-284
GitHub Advisory Database
github.com
5
phpmyfaq
access control
vulnerability
email validation
user profiles
manipulation
administrator
data loss

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.0%

phpMyFAQ prior to version 3.1.13 does not properly validate email addresses when updating user profiles. This vulnerability allows an attacker to manipulate their email address and change it to another email address that is already registered in the system, including email addresses belonging to other users such as the administrator. Once the attacker has control of the other user’s email address, they can request to remove the user from the system, leading to a loss of data and access.

Affected configurations

Vulners
Node
thorstenphpmyfaqRange<3.1.13
CPENameOperatorVersion
thorsten/phpmyfaqlt3.1.13

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.0%