Vulnerability Description
Multiple SQL injection vulnerabilities in Exponent CMS before 2.2.0 release candidate 1 allow remote attackers to execute arbitrary SQL commands via the (1) src or (2) username parameter to index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exponentcms | Exponent Cms | <= 2.2.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/93447
- http://packetstormsecurity.com/files/121643/Exponent-CMS-2.2.0-Beta-3-LFI-SQL-In
- http://seclists.org/bugtraq/2013/May/57
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84300
- https://www.htbridge.com/advisory/HTB23154
- http://osvdb.org/93447
- http://packetstormsecurity.com/files/121643/Exponent-CMS-2.2.0-Beta-3-LFI-SQL-In
- http://seclists.org/bugtraq/2013/May/57
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84300
- https://www.htbridge.com/advisory/HTB23154
FAQ
What is CVE-2013-3294?
CVE-2013-3294 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in Exponent CMS before 2.2.0 release candidate 1 allow remote attackers to execute arbitrary SQL commands via the (1) src or (2) username parameter to index.php.
How severe is CVE-2013-3294?
CVE-2013-3294 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3294?
Check the references section above for vendor advisories and patch information. Affected products include: Exponentcms Exponent Cms.