phpMyFAQ Forum Message username Field SQL Injection

high Nessus Plugin ID 17298


The remote web server contains a PHP script that allows for SQL injection attacks.


The remote host is running a version of phpMyFAQ that fails to sufficiently sanitize the 'username' parameter before using it in SQL queries. As a result, a remote attacker can pass malicious input to database queries, potentially resulting in data exposure, data modification, or attacks against the database itself.


Upgrade to phpMyFAQ version 1.4.7 or 1.5.0 RC2 or greater.

See Also

Plugin Details

Severity: High

ID: 17298

File Name: phpmyfaq_username_sql_injection.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 3/9/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:phpmyfaq:phpmyfaq

Required KB Items: www/phpmyfaq

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 3/6/2005

Reference Information

CVE: CVE-2005-0702

BID: 12741