CVE-2008-5939
MODx CMS 0.9.6.2 - Remote File Inclusion / Cross-Site Scripting
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site scripting (XSS) vulnerability in index.php in MODx CMS 0.9.6.2 and earlier allows remote attackers to inject arbitrary web script or HTML via a JavaScript event in the username field, possibly related to snippet.ditto.php. NOTE: some sources list the id parameter as being affected, but this is probably incorrect based on the original disclosure.
Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php en MODx CMS 0.9.6.2 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante un evento JavaScript en el parámetro id, posiblemente relacionado con snippet.ditto.php.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2009-01-21 CVE Reserved
- 2009-01-22 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/4940 | Third Party Advisory | |
http://svn.modxcms.com/svn/tattoo/tattoo/releases/0.9.6.3/install/changelog.txt | X_refsource_confirm | |
http://www.vupen.com/english/advisories/2008/3236 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46796 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/7204 | 2024-08-07 | |
http://www.securityfocus.com/bid/32436 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Modxcms Search vendor "Modxcms" | Modxcms Search vendor "Modxcms" for product "Modxcms" | <= 0.9.6.2 Search vendor "Modxcms" for product "Modxcms" and version " <= 0.9.6.2" | - |
Affected
| ||||||
Modxcms Search vendor "Modxcms" | Modxcms Search vendor "Modxcms" for product "Modxcms" | 0.9.0 Search vendor "Modxcms" for product "Modxcms" and version "0.9.0" | - |
Affected
| ||||||
Modxcms Search vendor "Modxcms" | Modxcms Search vendor "Modxcms" for product "Modxcms" | 0.9.1 Search vendor "Modxcms" for product "Modxcms" and version "0.9.1" | - |
Affected
| ||||||
Modxcms Search vendor "Modxcms" | Modxcms Search vendor "Modxcms" for product "Modxcms" | 0.9.2.1 Search vendor "Modxcms" for product "Modxcms" and version "0.9.2.1" | - |
Affected
| ||||||
Modxcms Search vendor "Modxcms" | Modxcms Search vendor "Modxcms" for product "Modxcms" | 0.9.5 Search vendor "Modxcms" for product "Modxcms" and version "0.9.5" | - |
Affected
| ||||||
Modxcms Search vendor "Modxcms" | Modxcms Search vendor "Modxcms" for product "Modxcms" | 0.9.6 Search vendor "Modxcms" for product "Modxcms" and version "0.9.6" | - |
Affected
| ||||||
Modxcms Search vendor "Modxcms" | Modxcms Search vendor "Modxcms" for product "Modxcms" | 0.9.6.1 Search vendor "Modxcms" for product "Modxcms" and version "0.9.6.1" | - |
Affected
|