CVE-2016-9182

Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:exponentcms:exponent_cms:2.4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:00

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/94227 - Third Party Advisory () http://www.securityfocus.com/bid/94227 - Third Party Advisory
References () https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b - Issue Tracking, Patch, Third Party Advisory () https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2016-11-04 10:59

Updated : 2024-11-21 03:00


NVD link : CVE-2016-9182

Mitre link : CVE-2016-9182

CVE.ORG link : CVE-2016-9182


JSON object : View

Products Affected

exponentcms

  • exponent_cms
CWE
CWE-284

Improper Access Control