SQL injection vulnerability in the getSection function in framework/core/subsystems/expRouter.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the section parameter.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html - Patch, Third Party Advisory | |
| References | () http://seclists.org/fulldisclosure/2016/Nov/12 - Patch, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/97232 - | |
| References | () http://www.securitytracker.com/id/1037252 - | |
| References | () https://github.com/exponentcms/exponent-cms/commit/1965e3719986406576898668855b8afbab43ed2c - Patch | 
Information
                Published : 2017-03-07 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-7784
Mitre link : CVE-2016-7784
CVE.ORG link : CVE-2016-7784
JSON object : View
Products Affected
                exponentcms
- exponent_cms
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
