First published: Mon Nov 07 2016(Updated: )
Multiple SQL injection vulnerabilities in the update method in framework/modules/core/controllers/expRatingController.php in Exponent CMS 2.4.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) content_type or (2) subtype parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9242 is considered a medium severity vulnerability due to its potential for SQL injection by authenticated users.
To fix CVE-2016-9242, upgrade Exponent CMS to a version later than 2.4.0 where the SQL injection vulnerabilities have been addressed.
CVE-2016-9242 affects remote authenticated users of Exponent CMS version 2.4.0.
CVE-2016-9242 allows attackers to execute arbitrary SQL commands through specific parameters in the update method.
Exponent CMS version 2.4.0 is the vulnerable version affected by CVE-2016-9242.