Information Exposure Affecting exponentcms/exponent-cms package, versions [,2.4.0]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.48% (64th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-EXPONENTCMSEXPONENTCMS-2364619
  • published26 Jan 2022
  • disclosed4 Nov 2016
  • creditUnknown

Introduced: 4 Nov 2016

CVE-2016-9183  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for exponentcms/exponent-cms.

Overview

Affected versions of this package are vulnerable to Information Exposure. In /framework/modules/ecommerce/controllers/orderController.php of Exponent CMS 2.4.0, untrusted input is passed into selectObjectsBySql. The method selectObjectsBySql of class mysqli_database uses the injectProof method to prevent SQL injection, but this filter can be bypassed easily: it only sanitizes user input if there are odd numbers of ' or " characters. Impact is Information Disclosure.

References

CVSS Base Scores

version 3.1