phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> element without user interaction or explicit consent. Version 3.2.10 fixes the issue.
History

Fri, 13 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
Description phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> element without user interaction or explicit consent. Version 3.2.10 fixes the issue.
Title phpMyFAQ Vulnerable to Unintended File Download Triggered by Embedded Frames
Weaknesses CWE-451
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-12-13T20:42:24.897Z

Reserved: 2024-12-12T15:00:38.902Z

Link: CVE-2024-55889

cve-icon Vulnrichment

Updated: 2024-12-13T20:42:18.023Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-13T14:15:22.653

Modified: 2024-12-13T21:15:13.483

Link: CVE-2024-55889

cve-icon Redhat

No data.