# Exploit Title: phpMyFAQ 2.9.8 Cross-Site Request Forgery (CSRF) # Date: 2024-10-26 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/thorsten/phpMyFAQ # Software Link: https://github.com/thorsten/phpMyFAQ # Version: 2.9.8 # Tested on: Ubuntu Windows # CVE : CVE-2017-15735 PoC: While still logged in, open another browser window:
Some Details: { "Protection Mechanisms Before Patch": "There was no CSRF token validation in place for the glossary modification actions (add, update, delete). The patch introduced CSRF token checks for both POST and GET requests to ensure that only authorized sessions could perform these actions.", "File Navigation Chain": "Public Access Entry URL -> phpmyfaq/admin/index.php -> glossary.main.php -> glossary.edit.php", "Execution Path Constraints": "The user must be authenticated with the necessary permissions ('editglossary') to reach and interact with the glossary functionality through the 'index.php' entry point. Without proper authentication, the server redirects to the login form.", "Request Parameters": "id, item, definition", "Request Method": "POST", "Request URL": "http://phpmyfaq/admin/index.php?action=updateglossary", "Final PoC": "```\n\n \n
\n \n \n \n \n
\n \n \n\n```" } [Replace Your Domain Name]