First published: Tue Feb 11 2014(Updated: )
Multiple SQL injection vulnerabilities in Exponent CMS before 2.2.0 release candidate 1 allow remote attackers to execute arbitrary SQL commands via the (1) src or (2) username parameter to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | <=2.2.0 | |
Exponentcms Exponent Cms | =0.97.0 | |
Exponentcms Exponent Cms | =0.98.0 | |
Exponentcms Exponent Cms | =0.99.0-beta1 | |
Exponentcms Exponent Cms | =2.0.0 | |
Exponentcms Exponent Cms | =2.0.1 | |
Exponentcms Exponent Cms | =2.0.2 | |
Exponentcms Exponent Cms | =2.0.3 | |
Exponentcms Exponent Cms | =2.0.4 | |
Exponentcms Exponent Cms | =2.0.5 | |
Exponentcms Exponent Cms | =2.0.6 | |
Exponentcms Exponent Cms | =2.0.7 | |
Exponentcms Exponent Cms | =2.0.8 | |
Exponentcms Exponent Cms | =2.0.9 | |
Exponentcms Exponent Cms | =2.1.0 | |
Exponentcms Exponent Cms | =2.1.1 | |
Exponentcms Exponent Cms | =2.1.2 | |
Exponentcms Exponent Cms | =2.1.3 | |
Exponentcms Exponent Cms | =2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-3294 is rated as high with a score of 7.5.
To fix CVE-2013-3294, upgrade Exponent CMS to version 2.2.0 release candidate 1 or later.
CVE-2013-3294 contains multiple SQL injection vulnerabilities that can allow remote attackers to execute arbitrary SQL commands.
Exponent CMS versions prior to 2.2.0 release candidate 1, including 0.97.0 to 2.1.4, are affected by CVE-2013-3294.
Attackers exploiting CVE-2013-3294 can manipulate the parameters to index.php to execute malicious SQL queries.