Miggo Logo

CVE-2024-28107: phpMyFAQ SQL injections at insertentry & saveentry

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.55473%
Published
3/25/2024
Updated
3/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyfaq/phpmyfaqcomposer= 3.2.53.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing escaping of email and notes fields in SQL query construction. The commit diff shows these fields were added to SQL queries without proper escaping in both create() and update() methods of the Faq class. These methods handle insertentry and saveentry actions respectively, as they are responsible for building and executing the SQL queries that were shown vulnerable in the PoCs. The direct use of user-controlled input (email and notes) without escaping makes these functions the injection points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * SQL inj**tion vuln*r**ility **s ***n *is*ov*r** in t** `ins*rt*ntry` & `s*v**ntry` w**n mo*i*yin* r**or*s *u* to improp*r *s**pin* o* t** *m*il ***r*ss. T*is *llows *ny *ut**nti**t** us*r wit* t** ri**ts to ***/**it **Q n*ws to *xploit

Reasoning

T** vuln*r**ility st*ms *rom missin* *s**pin* o* *m*il *n* not*s *i*l*s in SQL qu*ry *onstru*tion. T** *ommit *i** s*ows t**s* *i*l*s w*r* ***** to SQL qu*ri*s wit*out prop*r *s**pin* in *ot* *r**t*() *n* up**t*() m*t*o*s o* t** **q *l*ss. T**s* m*t*