vendor:
phpMyFAQ
by:
Nikhil Mittal (Payatu Labs)
8,8
CVSS
HIGH
Stored Cross-site Scripting (XSS)
79
CWE
Product Name: phpMyFAQ
Affected Version From: 2.9.8
Affected Version To: 2.9.8
Patch Exists: YES
Related CWE: 2017-15727
CPE: 2.9.8
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: MAC OS
2017
phpMyFAQ 2.9.8 Stored XSS Vulnerability
In phpMyFAQ before 2.9.9, there is Stored Cross-site Scripting (XSS) via an HTML attachment. Exploit code is <!DOCTYPE html> <html> <head> <title>XSS EXPLOIT</title> </head> <body> <script>confirm(document.cookie)</script> </body> </html>. Steps to reproduce: 1. Create a user having limited access rights to attachment section 2. Goto http://localhost/phpmyfaq/admin/?action=editentry 2. Upload the exploit code with .html extension at the place of attachements 3. Access the file url generated at /phpmyfaq/attachments/<random_path> 4. Reach to last file using directory traversal and XSS will triage
Mitigation:
Update to phpMyFAQ Version 2.9.9 http://download.phpmyfaq.de/phpMyFAQ-2.9.9.zip