CVE-2016-7791

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-7791
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7791.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-7791
Published
2017-01-12T22:59:00Z
Modified
2025-04-20T03:23:58.100756Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload an evil 'exploit.tar.gz' file to the website, then extract it by visiting '/install/index.php?install_sample=../../files/exploit', which leads to arbitrary code execution.

References

Affected packages

Git / github.com/exponentcms/exponent-cms

Affected ranges

Type
GIT
Repo
https://github.com/exponentcms/exponent-cms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

Beta1

beta1.*

beta1.1

v2.*

v2.0.0
v2.0.0.beta2
v2.0.0.beta2.1
v2.0.0.beta3
v2.0.0.beta4
v2.0.0.release-candidate1
v2.0.0.release-candidate2
v2.0.1
v2.0.1patch1
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.5patch1
v2.0.6
v2.0.6patch1
v2.0.6patch2
v2.0.7
v2.0.8
v2.0.8patch1
v2.0.8patch2
v2.0.9
v2.0.9patch1
v2.0.9patch2
v2.0.9patch3
v2.0.9patch4
v2.0.9patch5
v2.1.0
v2.1.1
v2.1.2
v2.1.3
v2.1.4
v2.1.4patch1
v2.2.0
v2.2.0alpha1
v2.2.0alpha2
v2.2.0alpha3
v2.2.0beta1
v2.2.0beta3
v2.2.0patch1
v2.2.0patch2
v2.2.0patch3
v2.2.0patch4
v2.2.0patch5
v2.2.1
v2.2.2
v2.2.2patch1
v2.2.2patch2
v2.2.3
v2.2.3patch1
v2.2.3patch2
v2.2.3patch3
v2.2.3patch4
v2.3.0
v2.3.0patch1
v2.3.0patch2
v2.3.0patch3
v2.3.0patch4
v2.3.1
v2.3.1patch4
v2.3.2
v2.3.2patch1
v2.3.2patch2
v2.3.3
v2.3.3patch1
v2.3.4
v2.3.4patch1
v2.3.5
v2.3.5patch1
v2.3.5patch2
v2.3.6
v2.3.7
v2.3.7patch1
v2.3.7patch2
v2.3.7patch3
v2.3.7patch4
v2.3.8
v2.3.8patch1
v2.3.8patch2
v2.3.8patch3
v2.3.8patch4
v2.3.8patch5
v2.3.8patch6
v2.3.9