Miggo Logo

CVE-2024-28106: phpMyFAQ Stored Cross-site Scripting at FAQ News Content

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.31166%
Published
3/25/2024
Updated
3/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyfaq/phpmyfaqcomposer= 3.2.53.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsanitized handling of the 'news' parameter in POST requests. The patch introduced a call to FaqHelper::cleanUpContent() in news.php, indicating the vulnerable code path was the news content processing flow prior to this sanitization step. While no specific function name is explicitly mentioned in the diff, the file-level modification in news.php and the XSS trigger mechanism confirm the vulnerability existed in the news content handling logic that lacked proper input sanitization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *y m*nipul*tin* t** n*ws p*r*m*t*r in * POST r*qu*st, *n *tt**k*r **n inj**t m*li*ious J*v*S*ript *o**. Upon *rowsin* to t** *ompromis** n*ws p***, t** XSS p*ylo** tri***rs. ### Po* *. **it * **Q n*ws, int*r**pt t** r*qu*st *n* mo*i*y t*

Reasoning

T** vuln*r**ility st*ms *rom uns*nitiz** **n*lin* o* t** 'n*ws' p*r*m*t*r in POST r*qu*sts. T** p*t** intro*u*** * **ll to **q**lp*r::*l**nUp*ont*nt() in n*ws.p*p, in*i**tin* t** vuln*r**l* *o** p*t* w*s t** n*ws *ont*nt pro**ssin* *low prior to t*is