MODX Revolution 2.5.6

CPE Details

MODX Revolution 2.5.6
2.5.6
2019-10-22
15h12 +00:00
2019-10-22
15h12 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:modx:modx_revolution:2.5.6:*:*:*:*:*:*:*

Informations

Vendor

modx

Product

modx_revolution

Version

2.5.6

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-1010123 2019-07-23 10h36 +00:00 MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php.
7.5
High
CVE-2018-20755 2019-02-06 16h00 +00:00 MODX Revolution through v2.7.0-pl allows XSS via the User Photo field.
6.1
Medium
CVE-2018-20756 2019-02-06 16h00 +00:00 MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs.
6.1
Medium
CVE-2018-20757 2019-02-06 16h00 +00:00 MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name.
6.1
Medium
CVE-2018-20758 2019-02-06 16h00 +00:00 MODX Revolution through v2.7.0-pl allows XSS via User Settings such as Description.
5.4
Medium
CVE-2018-1000208 2018-07-13 18h00 +00:00 MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have been fixed in pull 13980.
7.5
High
CVE-2018-1000207 2018-07-13 16h00 +00:00 MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
7.2
High
CVE-2017-1000223 2017-11-17 05h00 +00:00 A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS.
5.4
Medium
CVE-2017-9067 2017-05-18 16h00 +00:00 In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
7
High
CVE-2017-9068 2017-05-18 16h00 +00:00 In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
6.1
Medium
CVE-2017-9069 2017-05-18 16h00 +00:00 In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess.
8.8
High
CVE-2017-9070 2017-05-18 16h00 +00:00 In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php.
5.4
Medium
CVE-2017-9071 2017-05-18 16h00 +00:00 In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
4.7
Medium