CVE-2018-16638
https://notcve.org/view.php?id=CVE-2018-16638
Evolution CMS 1.4.x allows XSS via the manager/ search parameter. Evolution CMS 1.4.x permite Cross-Site Scripting (XSS) mediante el parámetro search en manager/. • https://github.com/security-breachlock/CVE-2018-16638/blob/master/evolution_xss_reflected.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-17556
https://notcve.org/view.php?id=CVE-2018-17556
MODX Revolution v2.6.5-pl allows stored XSS via a Create New Media Source action. MODX Revolution v2.6.5-pl permite Cross-Site Scripting (XSS) persistente mediante una acción Create New Media Source. • https://github.com/modxcms/revolution/issues/14094 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-1000207 – Modx Revolution Remote Code Execution
https://notcve.org/view.php?id=CVE-2018-1000207
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68. MODX Revolution en versiones iguales o anteriores a la 2.6.4 contiene una vulnerabilidad de control de acceso incorrecto en el filtrado de parámetros user antes de pasarlos a la clase phpthumb, lo que puede resultar en la creación de un archivo con un nombre de archivo y un contenido personalizados. Parece ser que este ataque puede ser explotado mediante una petición web. • https://github.com/a2u/CVE-2018-1000207 https://github.com/modxcms/revolution/commit/06bc94257408f6a575de20ddb955aca505ef6e68 https://github.com/modxcms/revolution/pull/13979 https://rudnkh.me/posts/critical-vulnerability-in-modx-revolution-2-6-4 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2018-1000208
https://notcve.org/view.php?id=CVE-2018-1000208
MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have been fixed in pull 13980. MODX Revolution en versiones iguales o anteriores a la 2.6.4 contiene una vulnerabilidad de salto de directorio en /core/model/modx/modmanagerrequest.class.php que puede resultar en la eliminación de archivos. Este ataque parece ser explotable mediante una petición web mediante el procesador security/login. • https://github.com/modxcms/revolution/pull/13980 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2018-10382
https://notcve.org/view.php?id=CVE-2018-10382
MODX Revolution 2.6.3 has XSS. MODX Revolution 2.6.3 tiene Cross-Site Scripting (XSS). • https://github.com/modxcms/revolution/pull/13887 https://github.com/modxcms/revolution/pull/13887/commits/3241473d8213e9551cef4ed0e8ac4645cfbd10c4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •