Intrusion Prevention

Exponent.CMS.EaasController.API.Function.SQL.Injection

Description

This indicates an attack attempt to exploit a SQL Injection vulnerability in Exponent CMS.
The vulnerability is due to insufficient validation of HTTP parameters when processing HTTP requests. It may allow remote attackers to execute arbitrary SQL statements via a crafted HTTP request which could lead to arbitrary code execution with database privileges.

Affected Products

exponent CMS 2.4.1 and prior

Impact

System Compromise: Remote attackers can add, view, delete or modify data in the database of the affected application

Recommended Actions

Currently we are unaware of any vendor supplied patch or updates available for this issue.

CVE References

CVE-2017-7991