Revolution
Sign in to watchby Modx
Source repositories
CVEs (27)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-7324 | Cri | 0.64 | 9.8 | 0.02 | Mar 30, 2017 | setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter. | |
| CVE-2017-7321 | Cri | 0.64 | 9.8 | 0.02 | Mar 30, 2017 | setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI. | |
| CVE-2017-1000067 | Hig | 0.57 | 8.8 | 0.01 | Jul 17, 2017 | MODX Revolution version 2.x - 2.5.6 is vulnerable to blind SQL injection caused by improper sanitization by the escape method resulting in authenticated user accessing database and possibly escalating privileges. | |
| CVE-2017-9069 | Hig | 0.57 | 8.8 | 0.01 | May 18, 2017 | In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess. | |
| CVE-2017-7323 | Hig | 0.53 | 8.1 | 0.01 | Mar 30, 2017 | The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism. | |
| CVE-2017-7322 | Hig | 0.53 | 8.1 | 0.01 | Mar 30, 2017 | The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via a crafted certificate. | |
| CVE-2016-10039 | Hig | 0.48 | 7.3 | 0.01 | Dec 24, 2016 | Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/getfiles. | |
| CVE-2016-10038 | Hig | 0.48 | 7.3 | 0.01 | Dec 24, 2016 | Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/remove. | |
| CVE-2016-10037 | Hig | 0.48 | 7.3 | 0.01 | Dec 24, 2016 | Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted id (aka dir) parameter, related to browser/directory/getlist. | |
| CVE-2017-9067 | Hig | 0.46 | 7.0 | 0.00 | May 18, 2017 | In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal. | |
| CVE-2017-11744 | Med | 0.40 | 6.1 | 0.00 | Jul 30, 2017 | In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module. | |
| CVE-2017-9068 | Med | 0.40 | 6.1 | 0.00 | May 18, 2017 | In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter. | |
| CVE-2017-7320 | Med | 0.40 | 6.1 | 0.00 | Mar 30, 2017 | setup/controllers/language.php in MODX Revolution 2.5.4-pl and earlier does not properly constrain the language parameter, which allows remote attackers to conduct Cookie-Bombing attacks and cause a denial of service (cookie quota exhaustion), or conduct HTTP Response Splitting attacks with resultant XSS, via an invalid parameter value. | |
| CVE-2017-1000223 | Med | 0.35 | 5.4 | 0.00 | Nov 17, 2017 | A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS. | |
| CVE-2017-9070 | Med | 0.35 | 5.4 | 0.00 | May 18, 2017 | In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php. | |
| CVE-2017-8115 | Med | 0.34 | 5.3 | 0.00 | Apr 25, 2017 | Directory traversal in setup/processors/url_search.php (aka the search page of an unused processor) in MODX Revolution 2.5.7 might allow remote attackers to obtain system directory information. | |
| CVE-2017-9071 | Med | 0.31 | 4.7 | 0.00 | May 18, 2017 | In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning. | |
| CVE-2014-8775 | 0.04 | — | 0.12 | Dec 3, 2014 | MODX Revolution 2.x before 2.2.15 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. | ||
| CVE-2010-5278 | 0.04 | — | 0.19 | Oct 7, 2012 | Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information. | ||
| CVE-2010-4883 | 0.04 | — | 0.08 | Oct 7, 2011 | Cross-site scripting (XSS) vulnerability in manager/index.php in MODx Revolution 2.0.2-pl allows remote attackers to inject arbitrary web script or HTML via the modhash parameter. |
Page 1 of 2