Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/94227 | Third Party Advisory |
https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/94227 | Third Party Advisory |
https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/94227 - Third Party Advisory | |
References | () https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2016-11-04 10:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9182
Mitre link : CVE-2016-9182
CVE.ORG link : CVE-2016-9182
JSON object : View
Products Affected
exponentcms
- exponent_cms
CWE
CWE-284
Improper Access Control