Vulnerability Description
Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.
CVSS Score
9.8
CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exponentcms | Exponent Cms | 2.0.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.htExploitPatchThird Party Advisory
- http://www.exponentcms.org/news/patch-3-released-for-v2-3-7Release NotesVendor Advisory
- http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-sExploitMitigationPatch
- http://www.securityfocus.com/archive/1/537499/100/0/threaded
- https://www.htbridge.com/advisory/HTB23290ExploitPatchThird Party Advisory
- http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.htExploitPatchThird Party Advisory
- http://www.exponentcms.org/news/patch-3-released-for-v2-3-7Release NotesVendor Advisory
- http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-sExploitMitigationPatch
- http://www.securityfocus.com/archive/1/537499/100/0/threaded
- https://www.htbridge.com/advisory/HTB23290ExploitPatchThird Party Advisory
FAQ
What is CVE-2016-2242?
CVE-2016-2242 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.
How severe is CVE-2016-2242?
CVE-2016-2242 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-2242?
Check the references section above for vendor advisories and patch information. Affected products include: Exponentcms Exponent Cms.