Описание
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.
Ссылки
- Third Party AdvisoryVDB Entry
- Issue TrackingPatch
- Third Party AdvisoryVDB Entry
- Issue TrackingPatch
Уязвимые конфигурации
Конфигурация 1Версия до 2.4.0 (включая)
cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.00251
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.
EPSS
Процентиль: 48%
0.00251
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89