Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter.
References
Link | Resource |
---|---|
https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/94227 | Third Party Advisory |
Configurations
Information
Published : 2016-11-04 03:59
Updated : 2016-11-29 10:37
NVD link : CVE-2016-9182
Mitre link : CVE-2016-9182
JSON object : View
CWE
CWE-284
Improper Access Control
Products Affected
exponentcms
- exponent_cms