First published: Fri Nov 11 2016(Updated: )
SQL Injection in framework/modules/search/controllers/searchController.php in Exponent CMS v2.4.0 allows remote attackers to read database information via action=search&module=search with the search_string parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9282 is classified as a high severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2016-9282, upgrade Exponent CMS to a version that has patched the SQL injection flaw.
Users of Exponent CMS version 2.4.0 are primarily affected by CVE-2016-9282.
CVE-2016-9282 is an SQL Injection vulnerability that allows attackers to read sensitive database information.
Yes, CVE-2016-9282 can be exploited remotely through crafted search requests.