A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS.
References
Link | Resource |
---|---|
https://raw.githubusercontent.com/modxcms/revolution/v2.5.7-pl/core/docs/changelog.txt | Release Notes Third Party Advisory |
https://raw.githubusercontent.com/modxcms/revolution/v2.5.7-pl/core/docs/changelog.txt | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/modxcms/revolution/v2.5.7-pl/core/docs/changelog.txt - Release Notes, Third Party Advisory |
Information
Published : 2017-11-17 05:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000223
Mitre link : CVE-2017-1000223
CVE.ORG link : CVE-2017-1000223
JSON object : View
Products Affected
modx
- modx_revolution
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')