CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

漏洞编号:CVE-2017-9067 MODx革命多个安全漏洞

2017年6月3日 1326点热度 0人点赞 0条评论

漏洞类别:CGI

漏洞等级:

漏洞信息

MODX (originally MODx) is a free, open source content management system and web application framework for publishing content on the world wide web and intranets.

MODX Revolution contains the following vulnerabilities:
CVE-2017-9067: When PHP 5.3.3 is used in MODX Revolution, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to the setup/index.php source file, aka directory traversal.
CVE-2017-9068: An unauthenticated, remote attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
CVE-2017-9069: An authenticated, remote attacker with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess.
CVE-2017-9070: An authenticated, remote attacker with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to the connectors/index.php source file.
CVE-2017-9071: An unauthenticated, remote attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.

Affected Versions:
MODX Revolution prior to 2.5.7

QID Detection Logic:
This unauthenticated QID leverages the BlindElephant engine to detect vulnerable MODX Revolution versions.

漏洞危害

Depending on the vulnerability being exploited, an attacker could execute arbitrary code, gain access to arbitrary files or conduct cross-site scripting attacks on a targeted system.

解决方案

Customers are advised to upgrade to MODX Revolution 2.5.7 or later versions to remediate these vulnerabilities.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

MODX Revolution 2.5.7 or later

0daybank

标签: 暂无
最后更新:2017年6月7日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me