11 Nov 2016
CVE-2016-9288 Vulnerability
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1. (CVSS:0.0) (Last Update:2016-11-11)
Vulnerability Details : In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1. Publish Date : 2016-11-11 Last Update Date : 2016-11-11 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2016-9288
- References For CVE-2016-9288
| ||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2016-9288There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |