Headline
CVE-2023-1758: fix: added missing conversion to HTML entities · thorsten/phpMyFAQ@f3380f4
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
@@ -127,10 +127,10 @@
<td>
<span style="font-weight: bold;">
<a href="mailto:<?= $newsComment->getEmail() ?>">
<?= $newsComment->getUsername() ?>
<?= Strings::htmlentities($newsComment->getUsername()) ?>
</a> |
<?= $date->format(date('Y-m-d H:i’, $faqComment->getDate())) ?> |
<a href="<?php printf('…/?action=news&id=%d&artlang=%s’, $faqComment->getRecordId(), $faqLangCode) ?>">
<?= $date->format(date('Y-m-d H:i’, $newsComment->getDate())) ?> |
<a href="<?php printf('…/?action=news&id=%d&artlang=%s’, $newsComment->getRecordId(), $faqLangCode) ?>">
<i class="fa fa-newspaper-o" aria-hidden="true"></i>
</a>
</span><br/>
Related news
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input. This has been fixed in 3.1.12.