Critical severity9.8NVD Advisory· Published Feb 6, 2017· Updated May 13, 2026
CVE-2017-5879
CVE-2017-5879
Description
An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects source_selector.php and the following parameter: src.
Affected products
1- cpe:2.3:a:exponentcms:exponent_cms:2.4.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/exponentcms/exponent-cms/issues/73nvdIssue TrackingPatchThird Party Advisory
- www.securityfocus.com/bid/96039nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.