phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
References
Link | Resource |
---|---|
https://github.com/thorsten/phpMyFAQ/commit/5479b4a4603cce71aa7eb4437f1c201153a1f1f5 | Patch |
https://github.com/thorsten/phpMyFAQ/pull/2827 | Patch |
https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-02-05T20:57:13.115Z
Updated: 2024-02-05T20:57:13.115Z
Reserved: 2024-01-25T15:09:40.211Z
Link: CVE-2024-24574
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-02-05T21:15:12.340
Modified: 2024-02-12T21:41:04.237
Link: CVE-2024-24574
JSON object: View
Redhat Information
No data.