Description
phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthenticated attackers can exploit the public GET /api/captcha endpoint by crafting malicious User-Agent headers to perform time-based blind SQL injection, extracting sensitive data including user credentials, admin tokens, and SMTP credentials from the database.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Any version before 4.1.2
4.1.2 (semver)
Credits
adrgs
aisafe-bot
References
github.com/...pMyFAQ/security/advisories/GHSA-289f-fq7w-6q2w (GHSA Advisory GHSA-289f-fq7w-6q2w)
github.com/...ommit/b9f25109fddb38eee19987183798638d07943f92
www.vulncheck.com/...via-user-agent-header-in-builtincaptcha (VulnCheck Advisory: phpMyFAQ - SQL Injection via User-Agent Header in BuiltinCaptcha)