CVE-2016-7790

Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload 'php' file to the website through uploader_paste.php, then overwrite /framework/conf/config.php, which leads to arbitrary code execution.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/09/22/6 Exploit Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/93119 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2016/09/22/6 Exploit Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/93119 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:exponentcms:exponent_cms:2.3.9:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/09/22/6 - Exploit, Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/09/22/6 - Exploit, Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/93119 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93119 - Third Party Advisory, VDB Entry

Information

Published : 2017-01-12 22:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7790

Mitre link : CVE-2016-7790

CVE.ORG link : CVE-2016-7790


JSON object : View

Products Affected

exponentcms

  • exponent_cms
CWE
CWE-20

Improper Input Validation