CVE-2016-9288
11.11.2016, 23:59
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.
Vendor | Product | Version |
---|---|---|
exponentcms | exponent_cms | 𝑥 ≤ 2.4.0 |
𝑥
= Vulnerable software versions
References