A Blind SQL Injection Vulnerability in Exponent CMS through 2.4.0, with the rerank array parameter, can lead to site database information disclosure and denial of service.
References
Link | Resource |
---|---|
https://github.com/exponentcms/exponent-cms/commit/fffb2038de4c603931b785a4c3ec69cfd06181ba | Issue Tracking Patch Third Party Advisory |
https://exponentcms.lighthouseapp.com/projects/61783/tickets/1395-blind-sql-injection-vulnerability-in-exponent-cms-240-5 | Vendor Advisory |
https://exponentcms.lighthouseapp.com/projects/61783/tickets/1394-blind-sql-injection-vulnerability-in-exponent-cms-240-4 | Vendor Advisory |
http://www.securityfocus.com/bid/94261 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2016-11-11 03:59
Updated : 2016-11-29 10:24
NVD link : CVE-2016-9272
Mitre link : CVE-2016-9272
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
exponentcms
- exponent_cms