Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-28105
HistoryMar 25, 2024 - 6:35 p.m.

CVE-2024-28105 phpMyFAQ's File Upload Bypass at Category Image Leads to RCE

2024-03-2518:35:05
CWE-434
GitHub_M
github.com
1
phpmyfaq
category image
rce
file upload
vulnerability
php 8.1
mysql
postgresql
content type
lang
manipulation
3.2.6 fix

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The category image upload function in phpmyfaq is vulnerable to manipulation of the Content-type and lang parameters, allowing attackers to upload malicious files with a .php extension, potentially leading to remote code execution (RCE) on the system. This vulnerability is fixed in 3.2.6.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:thorsten:phpmyfaq:*:*:*:*:*:*:*:*"
    ],
    "vendor": "thorsten",
    "product": "phpmyfaq",
    "versions": [
      {
        "status": "affected",
        "version": "3.2.5",
        "lessThan": "3.2.6",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-28105