phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
References
Link | Resource |
---|---|
https://github.com/thorsten/phpMyFAQ/commit/5479b4a4603cce71aa7eb4437f1c201153a1f1f5 | Patch |
https://github.com/thorsten/phpMyFAQ/pull/2827 | Patch |
https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-02-05 21:15
Updated : 2024-02-12 21:41
NVD link : CVE-2024-24574
Mitre link : CVE-2024-24574
CVE.ORG link : CVE-2024-24574
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq