Description
|
|
Multiple vulnerabilities were identified in Exponent CMS, which may be exploited by attackers to execute arbitrary commands.
The first flaw is due to an input validation error when processing uploaded images, which may be exploited by remote attackers to upload a specially crafted PHP script and execute arbitrary commands with the privileges of the web server.
The second vulnerability is due to input validation errors in the "navigation" and "resource" modules that do not properly filter a specially crafted "parent" or "id" parameter, which may be exploited by malicious users to conduct SQL injection attacks.
|