First published: Fri Nov 04 2016(Updated: )
In /framework/modules/ecommerce/controllers/orderController.php of Exponent CMS 2.4.0, untrusted input is passed into selectObjectsBySql. The method selectObjectsBySql of class mysqli_database uses the injectProof method to prevent SQL injection, but this filter can be bypassed easily: it only sanitizes user input if there are odd numbers of ' or " characters. Impact is Information Disclosure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9183 is categorized as a medium severity vulnerability due to the potential for SQL injection.
To fix CVE-2016-9183, upgrade Exponent CMS to a version that incorporates proper input validation and SQL sanitization.
CVE-2016-9183 affects Exponent CMS version 2.4.0.
CVE-2016-9183 involves improper handling of untrusted input that can lead to SQL injection.
Yes, attackers may exploit CVE-2016-9183 by bypassing the insufficient input sanitization mechanisms.