First published: Fri Nov 04 2016(Updated: )
Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9182 is classified as high due to the potential for unauthorized actions to be executed.
To fix CVE-2016-9182, update Exponent CMS to version 2.4.1 or later, which addresses the vulnerability.
CVE-2016-9182 can enable unauthorized access to methods within controller classes due to case insensitivity in method name checks.
CVE-2016-9182 affects Exponent CMS version 2.4.0.
CVE-2016-9182 can be exploited remotely by an attacker with knowledge of the method names in the application.