In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure.
References
Link Resource
http://www.securityfocus.com/bid/94227 Third Party Advisory VDB Entry
https://github.com/exponentcms/exponent-cms/commit/0ce8b94d745b818bd207933d9a2e7f32587c2c89 Issue Tracking Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2016-11-04T10:00:00

Updated: 2016-11-25T19:57:01

Reserved: 2016-11-04T00:00:00


Link: CVE-2016-9184

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2016-11-04T10:59:04.007

Modified: 2016-11-29T18:38:18.137


Link: CVE-2016-9184

JSON object: View

cve-icon Redhat Information

No data.