Miggo Logo

CVE-2024-55889:
thorsten/phpmyfaq Unintended File Download Triggered by Embedded Frames

4.9

CVSS Score
3.1

Basic Information

EPSS Score
0.71699%
Published
12/13/2024
Updated
12/13/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
thorsten/phpmyfaqcomposer< 3.2.103.2.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient access control in FAQ record retrieval. The commit diff shows modifications to the SQL query in getRecordBySolutionId() to add proper group/user permission checks. Originally, the query did not correctly validate() if a user had rights to access the FAQ record, allowing embedded iframes with attachment URLs to execute in unauthorized contexts. By fixing the permission checks in this function, the patch prevents unauthorized users from loading FAQ records containing malicious iframe triggers, addressing the root cause of the unintended download behavior.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * vuln*r**ility *xists in t** **Q R**or* *ompon*nt w**r* * privil**** *tt**k*r **n tri***r * *il* *ownlo** on * vi*tim's m***in* upon p*** visit *y *m****in* it in *n <i*r*m*> *l*m*nt wit*out us*r int*r**tion or *xpli*it *ons*nt. ### **

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt ****ss *ontrol in **Q r**or* r*tri*v*l. T** *ommit *i** s*ows mo*i*i**tions to t** SQL qu*ry in `**tR**or**ySolutionI*()` to *** prop*r *roup/us*r p*rmission ****ks. Ori*in*lly, t** qu*ry *i* not *orr**tly `v