CVE-2016-7788

SQL injection vulnerability in framework/modules/users/models/user.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html - Patch, Third Party Advisory () http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html - Patch, Third Party Advisory
References () http://seclists.org/fulldisclosure/2016/Nov/12 - Patch, Third Party Advisory () http://seclists.org/fulldisclosure/2016/Nov/12 - Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/97233 - () http://www.securityfocus.com/bid/97233 -
References () https://github.com/exponentcms/exponent-cms/commit/fdafb5ec97838e4edbd685f587f28d3174ebb3db - Patch () https://github.com/exponentcms/exponent-cms/commit/fdafb5ec97838e4edbd685f587f28d3174ebb3db - Patch

Information

Published : 2017-03-07 16:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7788

Mitre link : CVE-2016-7788

CVE.ORG link : CVE-2016-7788


JSON object : View

Products Affected

exponentcms

  • exponent_cms
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')