Page 5 of 39 results (0.006 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism. Las funcionalidades (1) update y (2) package-installation en MODX Revolution 2.5.4-pl y versiones anteriores utiliza por defecto http://rest.modx.com, lo que permite a atacantes man-in-the-middle suplantar servidores y desencadenar la ejecución de código arbitrario aprovechando la falta del mecanismo de protección HTTPS. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via a crafted certificate. Las funcionalidades (1) update y (2) package-installation features en MODX Revolution 2.5.4-pl y versiones anteriores no verifican certificados X.509 de servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores y activar la ejecución de código arbitrario a través de un certificado manipulado. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf • CWE-295: Improper Certificate Validation •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 1

setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter. setup/templates/findcore.php en MODX Revolution 2.5.4-pl y versiones anteriores permite a atacantes remotos ejecutar código arbitrario PHP a través del parámetro core_path. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 1

setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI. setup/controllers/welcome.php en MODX Revolution 2.5.4-pl y versiones anteriores permite a atacantes remotos ejecutar código PHP arbitrario a través del parámetro config_key para la URI setup/index.php?action=welcome. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

setup/controllers/language.php in MODX Revolution 2.5.4-pl and earlier does not properly constrain the language parameter, which allows remote attackers to conduct Cookie-Bombing attacks and cause a denial of service (cookie quota exhaustion), or conduct HTTP Response Splitting attacks with resultant XSS, via an invalid parameter value. setup/controllers/language.php en MODX Revolution 2.5.4-pl y versiones anteriores no restringe adecuadamente el parámetro language, lo que permite a atacantes remotos llevar a cabo ataques de bombardeo de cookies y provocar una denegación de servicio (agotamiento de la cuota de cookie), o llevar a cabo ataques HTTP Response Splitting con XSS resultante, a través de un valor de parámetro no válido. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •