First published: Fri Nov 04 2016(Updated: )
In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9184 is classified as a critical vulnerability due to its potential for SQL Injection, which can lead to unauthorized access to sensitive data.
To fix CVE-2016-9184, it is recommended to upgrade Exponent CMS to the latest version that addresses this vulnerability.
CVE-2016-9184 is an SQL Injection vulnerability that arises from improper handling of untrusted input in Exponent CMS.
CVE-2016-9184 specifically affects Exponent CMS version 2.4.0.
The impacts of CVE-2016-9184 include the possibility of unauthorized data access and manipulation due to SQL Injection.