vendor:
MODx Revolution CMS
by:
Gjoko 'LiquidWorm' Krstic
7,5
CVSS
HIGH
XSS
79
CWE
Product Name: MODx Revolution CMS
Affected Version From: 2.0.4-pl2
Affected Version To: 2.0.4-pl2
Patch Exists: YES
Related CWE: N/A
CPE: a:modx:modx_revolution:2.0.4-pl2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Fedora 10 (Cambridge), Apache 2.2.14, PHP 5.2.10, MySQL 5.0.88
2010
MODx Revolution CMS 2.0.4-pl2 Remote XSS POST Injection Vulnerability
The MODx Revolution CMS suffers from a XSS vulnerability when parsing user input to the 'username' and 'email' parameters via POST method in login.php script at the manager login interface. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.
Mitigation:
Input validation should be used to prevent XSS attacks.