Miggo Logo

CVE-2023-2429:
phpMyFAQ Improper Access Control vulnerability

6.6

CVSS Score
3.0

Basic Information

EPSS Score
0.43482%
Published
4/30/2023
Updated
1/30/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
thorsten/phpmyfaqcomposer< 3.1.133.1.13

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The core vulnerability stems from ajaxservice.php's update handler not verifying email ownership before processing changes. The patch added a critical check comparing the current user's ID with the email's owner ID via getUserIdByEmail(). The User.php function's return type fix (removing int cast) suggests potential type comparison issues exacerbated the vulnerability. Together, these created an insecure chain: 1) Missing ownership check in update flow, 2) Possible type mismatch in user ID comparison.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

p*pMy**Q prior to v*rsion *.*.** *o*s not prop*rly v*li**t* *m*il ***r*ss*s w**n up**tin* us*r pro*il*s. T*is vuln*r**ility *llows *n *tt**k*r to m*nipul*t* t**ir *m*il ***r*ss *n* ***n** it to *not**r *m*il ***r*ss t**t is *lr***y r**ist*r** in t**

Reasoning

T** *or* vuln*r**ility st*ms *rom `*j*xs*rvi**.p*p`'s up**t* **n*l*r not v*ri*yin* *m*il own*rs*ip ***or* pro**ssin* ***n**s. T** p*t** ***** * *riti**l ****k *omp*rin* t** *urr*nt us*r's I* wit* t** *m*il's own*r I* vi* `**tUs*rI**y*m*il()`. T** `Us