First published: Fri Nov 11 2016(Updated: )
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | <=2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9288 is considered a critical vulnerability due to its ability to allow SQL injection attacks.
To fix CVE-2016-9288, you should upgrade Exponent CMS to version 2.4.1 or later.
CVE-2016-9288 is classified as an SQL injection vulnerability.
CVE-2016-9288 affects Exponent CMS version 2.4.0 and all versions prior to it.
The attack vector for CVE-2016-9288 is through unfiltered user input in the "target" parameter of the DragnDropReRank function.