Vulnerability Description
install/index.php in Exponent CMS 2.3.9 allows remote attackers to execute arbitrary commands via shell metacharacters in the sc array parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exponentcms | Exponent Cms | 2.3.9 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/09/22/6Mailing ListThird Party Advisory
- https://exponentcms.lighthouseapp.com/projects/61783/changesets/4ae457ff1bf80e8bIssue TrackingVendor Advisory
- https://github.com/exponentcms/exponent-cms/commit/4ae457ff1bf80e8b61286cd125ca7Issue TrackingPatchThird Party Advisory
- https://github.com/exponentcms/exponent-cms/releases/tag/v2.4.0
- http://www.openwall.com/lists/oss-security/2016/09/22/6Mailing ListThird Party Advisory
- https://exponentcms.lighthouseapp.com/projects/61783/changesets/4ae457ff1bf80e8bIssue TrackingVendor Advisory
- https://github.com/exponentcms/exponent-cms/commit/4ae457ff1bf80e8b61286cd125ca7Issue TrackingPatchThird Party Advisory
- https://github.com/exponentcms/exponent-cms/releases/tag/v2.4.0
FAQ
What is CVE-2016-7565?
CVE-2016-7565 is a vulnerability with a CVSS score of 9.8 (CRITICAL). install/index.php in Exponent CMS 2.3.9 allows remote attackers to execute arbitrary commands via shell metacharacters in the sc array parameter.
How severe is CVE-2016-7565?
CVE-2016-7565 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-7565?
Check the references section above for vendor advisories and patch information. Affected products include: Exponentcms Exponent Cms.