CVE-2016-9288 in CMSinfo

Summary

In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.

Be aware that VulDB is the high quality source for vulnerability data.

Reservation

11/11/2016

Disclosure

11/11/2016

Entries

1: VDB-93587

CPE

ready

CVSS

9.8

EPSS

0.00251

Activities

Very Low

Sources

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!