CVE-2016-2242

Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:exponentcms:exponent_cms:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.4:p3:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.5:p1:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.6:p2:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.8:p2:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.0.9:p5:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.1.4:p11:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.2.0:p5:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.2.2:p2:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.2.3:p14:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.0:p4:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.1:p4:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.2:p2:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.3:p1:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.4:p1:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.5:p2:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:exponentcms:exponent_cms:2.3.8:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html - Exploit, Patch, Third Party Advisory () http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html - Exploit, Patch, Third Party Advisory
References () http://www.exponentcms.org/news/patch-3-released-for-v2-3-7 - Release Notes, Vendor Advisory () http://www.exponentcms.org/news/patch-3-released-for-v2-3-7 - Release Notes, Vendor Advisory
References () http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability - Exploit, Mitigation, Patch, Vendor Advisory () http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability - Exploit, Mitigation, Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/537499/100/0/threaded - () http://www.securityfocus.com/archive/1/537499/100/0/threaded -
References () https://www.htbridge.com/advisory/HTB23290 - Exploit, Patch, Third Party Advisory () https://www.htbridge.com/advisory/HTB23290 - Exploit, Patch, Third Party Advisory

Information

Published : 2017-01-23 21:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2242

Mitre link : CVE-2016-2242

CVE.ORG link : CVE-2016-2242


JSON object : View

Products Affected

exponentcms

  • exponent_cms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')