CVE-2016-7791

Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload an evil 'exploit.tar.gz' file to the website, then extract it by visiting '/install/index.php?install_sample=../../files/exploit', which leads to arbitrary code execution.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/09/29/11 Exploit Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/93119 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2016/09/29/11 Exploit Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/93119 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:exponentcms:exponent_cms:2.3.9:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/09/29/11 - Exploit, Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/09/29/11 - Exploit, Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/93119 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93119 - Third Party Advisory, VDB Entry

Information

Published : 2017-01-12 22:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7791

Mitre link : CVE-2016-7791

CVE.ORG link : CVE-2016-7791


JSON object : View

Products Affected

exponentcms

  • exponent_cms
CWE
CWE-20

Improper Input Validation