phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
References
Configurations
History
21 Nov 2024, 08:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/thorsten/phpMyFAQ/commit/5479b4a4603cce71aa7eb4437f1c201153a1f1f5 - Patch | |
References | () https://github.com/thorsten/phpMyFAQ/pull/2827 - Patch | |
References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
12 Feb 2024, 21:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Phpmyfaq phpmyfaq
Phpmyfaq |
|
CPE | cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:* | |
References | () https://github.com/thorsten/phpMyFAQ/pull/2827 - Patch | |
References | () https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx - Exploit, Vendor Advisory | |
References | () https://github.com/thorsten/phpMyFAQ/commit/5479b4a4603cce71aa7eb4437f1c201153a1f1f5 - Patch |
05 Feb 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-05 21:15
Updated : 2024-11-21 08:59
NVD link : CVE-2024-24574
Mitre link : CVE-2024-24574
CVE.ORG link : CVE-2024-24574
JSON object : View
Products Affected
phpmyfaq
- phpmyfaq