Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability | patch vendor advisory mitigation exploit |
http://www.exponentcms.org/news/patch-3-released-for-v2-3-7 | release notes vendor advisory |
http://www.securityfocus.com/archive/1/537499/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html | exploit third party advisory patch |
https://www.htbridge.com/advisory/HTB23290 | exploit third party advisory patch |