<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
      <title>Security — Exponent Forums</title>
      <link>http://forums.exponentcms.org/index.php?p=/</link>
      <pubDate>Fri, 01 May 2026 12:28:49 +0000</pubDate>
         <description>Security — Exponent Forums</description>
   <language>en</language>
   <atom:link href="/index.php?p=/discussions/feed.rss" rel="self" type="application/rss+xml" />
		<item>
			<title>Security Validation Failed</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1561/security-validation-failed</link>
			<pubDate>Mon, 07 Nov 2016 13:33:56 +0000</pubDate>
			<dc:creator>eVenster</dc:creator>
			<guid isPermaLink="false">1561@/index.php?p=/discussions</guid>
			<description><![CDATA[Google recaptcha gives a Security Validation Failed. Exponent 2.4 (p1)<br />]]></description>
		</item>
		<item>
			<title>Maybe potential SQL injection</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1559/maybe-potential-sql-injection</link>
			<pubDate>Wed, 02 Nov 2016 07:56:03 +0000</pubDate>
			<dc:creator>obfusor</dc:creator>
			<guid isPermaLink="false">1559@/index.php?p=/discussions</guid>
			<description><![CDATA[I found two potential SQL injections.&nbsp;<br /><br />0x1 &gt; framework/modules/eaas/controllers/eaasController.php , $key can becontrolled. And in the line 33 of framework/core/models/expConfig.php,$this-&gt;location_data can be controlled and injected. It is possible to boolean-based blind SQL Inject by the param of apikey.&nbsp;<br /><br />[Suggest Fix]: parent::__construct($db-&gt;selectValue($this-&gt;table, 'id', "location_data='".expString::escape($this-&gt;location_data)."'"));<br /><br />&nbsp;0x2. In the function activate_address of the file framework/modules/addressbook/controllers/addressController.php, $this-&gt;params['is_what'] can be controlled and injected. It is possible to do time-based SQL inject by the param 'is_what'.&nbsp;<br />Although there is expString::escape filter, it can be bypass like is_what= "firstname=0x61 where sleep(10)-- a".&nbsp;<br /><br />[Suggest Fix]: $is_what should be existed columns ;<br /><br />Sorry, the previous one is down. I post again.]]></description>
		</item>
		<item>
			<title>Maybe There is an possible sql inject.</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1554/maybe-there-is-an-possible-sql-inject</link>
			<pubDate>Wed, 26 Oct 2016 16:42:05 +0000</pubDate>
			<dc:creator>obfusor</dc:creator>
			<guid isPermaLink="false">1554@/index.php?p=/discussions</guid>
			<description><![CDATA[I found a potential sql injection.&nbsp;In the function getPageByName&nbsp;of file&nbsp;framework/core/subsystems/expRouter.php, in the line 707,<br />Code:$section = $db-&gt;selectObject('section', "sef_name='".$url_name."'");<br />Maybe $url_name could be controlled in line 786, $section = $this-&gt;url_style=="sef" ? $this-&gt;getPageByName($_REQUEST['section']), which may lead to sql&nbsp;injection.<br />Suggested Fix:&nbsp;<br />&nbsp;line 707, file&nbsp;framework/core/subsystems/expRouter.php<br />$section = $db-&gt;selectObject('section', "sef_name='".expString::escape($url_name)."'"); ^-^<br /><br />]]></description>
		</item>
		<item>
			<title>Security Vulnerability - All Exponent Versions - September 2016 (Updated)</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1549/security-vulnerability-all-exponent-versions-september-2016-updated</link>
			<pubDate>Tue, 13 Sep 2016 00:19:28 +0000</pubDate>
			<dc:creator>dleffler</dc:creator>
			<guid isPermaLink="false">1549@/index.php?p=/discussions</guid>
			<description><![CDATA[<p>There are several security vulnerabilities in Exponent 2.x found on September 12 and 13, 2016, reported by Manuel Garcia Cardenas and PKAV TEAM which could allow possible SQL injections. They&nbsp;have been present in all versions of Exponent (2.x).&nbsp;The fix&nbsp;is:</p><ul><li>Update to the latest version (v2.3.9) and the latest patch (v2.3.9patch1)&nbsp;which will be released around September 13th. This is the recommended fix since it also addresses several security issues and other fixes not addressed in the patches to v2.2.3 nor v2.1.4.</li><li>If running a version 2.2.x installation and not wanting to update to the latest version, you should update to v2.2.3 (<em>last release before major version update to v2.3.x</em>) and install its latest patch (v2.2.3patch14).&nbsp;<strong>If you are already running v2.2.3, you'll want to install this patch to also correct some other issues.</strong></li><li>If running a version prior to v2.2.0 (v2.0.x or v2.1.x) installation and&nbsp;not wanting to update to the latest version, you should update to v2.1.4 (<em>last release before major version update to v2.2.x</em>) and install its latest patch (v2.1.4patch11). If you are already running v2.1.4, you'll want to install this patch.&nbsp;<b>It should be noted that v2.1.4 will NOT run on any of the currently maintained versions of PHP (v5.6 and v7.0).</b></li><li>There is no manual method,</li></ul>]]></description>
		</item>
		<item>
			<title>Updated Patches released for v2.1.4 and v2.2.3 - September 2016 (Updated)</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1550/updated-patches-released-for-v2-1-4-and-v2-2-3-september-2016-updated</link>
			<pubDate>Tue, 13 Sep 2016 00:21:25 +0000</pubDate>
			<dc:creator>dleffler</dc:creator>
			<guid isPermaLink="false">1550@/index.php?p=/discussions</guid>
			<description><![CDATA[<p>Though they are both extremely old versions, with v2.1.4 no longer running on the maintained releases of PHP (v5.6 and v7.0), they were the release before a major version change and are/may still be&nbsp;in use. Please bear in mind we&nbsp;<strong>strongly recommend</strong>&nbsp;your installations be updated to a much newer version which contains many more fixes and new features. Having said that, these patches (v2.1.4patch11 and v2.2.3patch14) fix security vulnerabilities reported by&nbsp;Manuel Garcia Cardenas and PKAV TEAM which could allow possible SQL injections.</p><p>You can find the patches&nbsp;<a rel="nofollow" href="/index.php?p=/home/leaving&target=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fexponentcms%2Ffiles%2F" class="Popup">here</a>.</p>]]></description>
		</item>
		<item>
			<title>Updated Patches released for v2.1.4 and v2.2.3 - August 2016</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1548/updated-patches-released-for-v2-1-4-and-v2-2-3-august-2016</link>
			<pubDate>Fri, 02 Sep 2016 03:52:31 +0000</pubDate>
			<dc:creator>dleffler</dc:creator>
			<guid isPermaLink="false">1548@/index.php?p=/discussions</guid>
			<description><![CDATA[<p>Though they are both extremely old versions, they were the release before a major version change and are/may still be&nbsp;in use. Please bear in mind we <strong>strongly recommend</strong> your installations be updated to a much newer version which contains many more fixes and new features. Having said that, these patches (v2.1.4patch9&nbsp;and v2.2.3patch12) fix a security vulnerability reported by Balisong which might allow uploaded scripts to be executed.</p><p>You can find the patches <a rel="nofollow" href="/index.php?p=/home/leaving&target=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fexponentcms%2Ffiles%2F" class="Popup">here</a>.</p>]]></description>
		</item>
		<item>
			<title>Security Vulnerability - All Exponent Versions - August 2016</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1547/security-vulnerability-all-exponent-versions-august-2016</link>
			<pubDate>Fri, 02 Sep 2016 03:51:38 +0000</pubDate>
			<dc:creator>dleffler</dc:creator>
			<guid isPermaLink="false">1547@/index.php?p=/discussions</guid>
			<description><![CDATA[<p>There is a security vulnerability&nbsp;in Exponent 2.x found on August 26, 2016&nbsp;reported by Balisong which could allow uploaded scripts to be executed. &nbsp;It has been present in all versions of Exponent (2.x).&nbsp;The fix&nbsp;is:</p><ul><li>Update to the latest version (v2.3.9) which will be released around September 1st. This is the recommended fix since it also addresses several security issues and other fixes not addressed in the patches to v2.2.3 nor v2.1.4.</li><li>If running a version 2.2.x installation and not wanting to update to the latest version, you should update to v2.2.3 (<em>last release before major version update to v2.3.x</em>) and install its latest patch (v2.2.3patch12). <strong>If you are already running v2.2.3, you'll want to install this patch to also correct some other issues.</strong></li><li>If running a version prior to v2.2.0 (v2.0.x or v2.1.x) installation and&nbsp;not wanting to update to the latest version, you should update to v2.1.4 (<em>last release before major version update to v2.2.x</em>) and install its latest patch (v2.1.4patch9). If you are already running v2.1.4, you'll want to install this patch.</li><li>There is no easy manual method, but in simple terms we update/add the&nbsp;.htaccess files&nbsp;into the /files and /tmp folders and their subfolders</li></ul>]]></description>
		</item>
		<item>
			<title>Security Vulnerability - All Exponent Versions - June 2016</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/1535/security-vulnerability-all-exponent-versions-june-2016</link>
			<pubDate>Fri, 03 Jun 2016 14:13:13 +0000</pubDate>
			<dc:creator>dleffler</dc:creator>
			<guid isPermaLink="false">1535@/index.php?p=/discussions</guid>
			<description><![CDATA[There are two security vulnerabilities in Exponent 2.x found on June 1, 2016. &nbsp;The first has been present in all versions of Exponent (2.x), and the second is found in all versions since and including v2.1.0. &nbsp;The fix(es) is:<br /><ul><li>Update to the latest version (v2.3.8) and install the latest patch (v2.3.8patch3). This is the recommended fix since it also addresses several security issues and other fixes not addressed in the patches to v2.2.3 nor v2.1.4.</li><li>If running a version 2.2.x installation and not wanting to update to the latest version, you should update to v2.2.3 (<i>last release before major version update to v2.3.x</i>) and install its latest patch (v2.2.3patch11). <b>If you are already running v2.2.3, you'll want to install this patch to also correct some other issues.</b></li><li>If running a version prior to v2.2.0 (v2.0.x or v2.1.x) installation and&nbsp;not wanting to update to the latest version, you should update to v2.1.4 (<i>last release before major version update to v2.2.x</i>) and install its latest patch (v2.1.4patch8). If you are already running v2.1.4, you'll want to install this patch.</li><li>If you are unwilling to update to a newer version or the current version, you must delete these two files:</li><ul><li><b>/external/adminer/admin.php</b> - which will disable the built-in database manager</li><li><b>/framework/modules/pixidou/download.php</b> - this file was never used by Exponent<br /></li></ul></ul>]]></description>
		</item>
		<item>
			<title>Is it ok to delete / comment out Options -ExecCGI ?</title>
			<link>http://forums.exponentcms.org/index.php?p=/discussion/901/is-it-ok-to-delete-comment-out-options-execcgi</link>
			<pubDate>Fri, 26 Sep 2014 22:36:00 +0000</pubDate>
			<dc:creator>generare</dc:creator>
			<guid isPermaLink="false">901@/index.php?p=/discussions</guid>
			<description><![CDATA[Is it ok to comment out Options -ExecCGI<br />in htaccess file in the folder of "files"?<br /><br />Or should we rather find out why the server won't accept this line? It is giving an exact error that the line is accepted in the server.	<br /><br /><br />View article... ]]></description>
		</item>
   <language>en</language>
   </channel>
</rss>
