Miggo Logo

CVE-2023-0880: Misinterpretation of Input in thorsten/phpmyfaq

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.17187%
Published
2/17/2023
Updated
2/28/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
thorsten/phpmyfaqcomposer< 3.1.113.1.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the lack of input trimming in ajaxservice.php. The patch adds trim() to user inputs like 'name', 'email', and 'question' to prevent whitespace-only values. The original code processed these inputs via Filter::filterInput and other sanitization steps but did not trim leading/trailing whitespace. This allowed attackers to submit questions/answers with only spaces, bypassing validation. The vulnerable code resides in the procedural input-handling blocks of ajaxservice.php (e.g., under 'savequestion' and 'save' actions), where untrimmed inputs were directly used.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Misint*rpr*t*tion o* Input in *it*u* r*pository t*orst*n/p*pmy**q prior to *.*.**.

Reasoning

T** vuln*r**ility st*ms *rom t** l**k o* input trimmin* in `*j*xs*rvi**.p*p`. T** p*t** ***s `trim()` to us*r inputs lik* 'n*m*', '*m*il', *n* 'qu*stion' to pr*v*nt w*it*sp***-only v*lu*s. T** ori*in*l *o** pro**ss** t**s* inputs vi* `*ilt*r::*ilt*rI