Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/94227 | Third Party Advisory |
https://github.com/exponentcms/exponent-cms/commit/684d79424f768db8bb345d5c68aa2a886239492b | Issue Tracking Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-11-04T10:00:00
Updated: 2016-11-25T19:57:01
Reserved: 2016-11-04T00:00:00
Link: CVE-2016-9182
JSON object: View
NVD Information
Status : Analyzed
Published: 2016-11-04T10:59:01.333
Modified: 2016-11-29T18:37:37.863
Link: CVE-2016-9182
JSON object: View
Redhat Information
No data.
CWE