phpMyFAQ SQL Injection and File Upload Vulnerability

Posted on Monday, January 08, 2007 @ 09:06:52 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23651

VERIFY ADVISORY: http://secunia.com/advisories/23651/

CRITICAL: Highly critical

IMPACT: Manipulation of data, System access

SOFTWARE: phpMyFAQ 1.x - http://secunia.com/product/3487/

DESCRIPTION: Some vulnerabilities have been reported in phpMyFAQ, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system.


1) Input passed to unspecified parameters is not properly sanitised before being used in a SQL query. This can be exploited to modify SQL queries by injecting arbitrary SQL code.

2) An unspecified error can be exploited to upload arbitrary files and potentially execute arbitrary PHP code.

The vulnerabilities are reported in versions prior to 1.6.8.

SOLUTION: Update to version 1.6.8.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Stefan Esser and Markus Kohlmeyer.

ORIGINAL ADVISORY: http://www.phpmyfaq.de/advisory_2006-12-15.php