{ "schema_version": "1.4.0", "id": "GHSA-7xgm-jxp3-q6jg", "modified": "2022-05-17T02:24:18Z", "published": "2022-05-17T02:24:18Z", "aliases": [ "CVE-2016-9288" ], "details": "In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter \"target\" of function \"DragnDropReRank\" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9288" }, { "type": "WEB", "url": "https://github.com/exponentcms/exponent-cms/commit/2ddffb2e7eafe4830e3483a4b437873022c461ba" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/94296" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037280" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-11-11T23:59:00Z" } }