Miggo Logo

CVE-2024-27299: phpMyFAQ SQL Injection at "Save News"

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.76268%
Published
3/25/2024
Updated
3/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyfaq/phpmyfaqcomposer= 3.2.53.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff explicitly shows missing escaping for authorEmail in both addNewsEntry and updateNewsEntry methods. These methods construct SQL INSERT/UPDATE statements using user-controlled input without proper sanitization. The vulnerability manifests when attacker-controlled email input (with SQL comment syntax) combines with other fields (like linkTitle) to form valid malicious SQL payloads. The patch adds Db::escape() calls specifically for authorEmail, confirming these were the vulnerable entry points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * SQL inj**tion vuln*r**ility **s ***n *is*ov*r** in t** t** "*** N*ws" *un*tion*lity *u* to improp*r *s**pin* o* t** *m*il ***r*ss. T*is *llows *ny *ut**nti**t** us*r wit* t** ri**ts to ***/**it **Q n*ws to *xploit t*is vuln*r**ility to

Reasoning

T** *ommit *i** *xpli*itly s*ows missin* *s**pin* *or *ut*or*m*il in *ot* `***N*ws*ntry` *n* `up**t*N*ws*ntry` m*t*o*s. T**s* m*t*o*s *onstru*t SQL INS*RT/UP**T* st*t*m*nts usin* us*r-*ontroll** input wit*out prop*r s*nitiz*tion. T** vuln*r**ility m*