CPE, which stands for Common Platform Enumeration, is a standardized scheme for naming hardware, software, and operating systems. CPE provides a structured naming scheme to uniquely identify and classify information technology systems, platforms, and packages based on certain attributes such as vendor, product name, version, update, edition, and language.
CWE, or Common Weakness Enumeration, is a comprehensive list and categorization of software weaknesses and vulnerabilities. It serves as a common language for describing software security weaknesses in architecture, design, code, or implementation that can lead to vulnerabilities.
CAPEC, which stands for Common Attack Pattern Enumeration and Classification, is a comprehensive, publicly available resource that documents common patterns of attack employed by adversaries in cyber attacks. This knowledge base aims to understand and articulate common vulnerabilities and the methods attackers use to exploit them.
Services & Price
Help & Info
Search : CVE id, CWE id, CAPEC id, vendor or keywords in CVE
MODX Revolution 2.x before 2.2.15 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism by (1) omitting the CSRF token or via a (2) long string in the CSRF token parameter.
Cross-Site Request Forgery (CSRF) The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Metrics
Metrics
Score
Severity
CVSS Vector
Source
V2
6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
nvd@nist.gov
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
Date
EPSS V0
EPSS V1
EPSS V2 (> 2022-02-04)
EPSS V3 (> 2025-03-07)
EPSS V4 (> 2025-03-17)
2022-02-06
–
–
1.06%
–
–
2022-02-13
–
–
1.06%
–
–
2022-03-20
–
–
1.06%
–
–
2022-04-03
–
–
1.06%
–
–
2022-04-10
–
–
1.06%
–
–
2022-07-03
–
–
1.06%
–
–
2022-09-25
–
–
1.06%
–
–
2023-02-19
–
–
1.06%
–
–
2023-03-12
–
–
–
0.16%
–
2023-03-19
–
–
–
0.16%
–
2023-08-13
–
–
–
0.16%
–
2024-02-11
–
–
–
0.16%
–
2024-02-18
–
–
–
0.18%
–
2024-04-14
–
–
–
0.16%
–
2024-06-02
–
–
–
0.16%
–
2024-07-14
–
–
–
0.16%
–
2024-08-04
–
–
–
0.16%
–
2024-08-11
–
–
–
0.16%
–
2024-12-08
–
–
–
0.15%
–
2024-12-22
–
–
–
0.16%
–
2025-01-05
–
–
–
0.16%
–
2025-01-19
–
–
–
0.16%
–
2025-03-18
–
–
–
–
0.27%
2025-03-30
–
–
–
–
0.36%
2025-04-10
–
–
–
–
0.36%
2025-04-10
–
–
–
–
0.36,%
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Publication date : 2014-11-04 23h00 +00:00 Author : Narendra Bhati EDB Verified : No
Advisory ID: 92152
Product: MODX Revolution
Vendor: MODX
Vulnerable Version(s): 2.0.02.2.14
Tested Version: 2.2.14
Advisory Publication: 16 July, 2014 [without technical details]
Vendor Notification: 16 July, 2014
Vendor Patch: 15 July, 2014
Public Disclosure: 2 November , 2014
Vulnerability Type: CSRF Tokens Bypass + Reflected Cross Site Scripting + Stored XSS
CVE Reference: Requested
Risk Level: Critical
Solution Status: Fixed by Vendor
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ )
Patch - Upgrade to MODX Revolution 2.2.15. Due to the nature of this issue and the number of files requiring changes the solution is to upgrade. No installable patch or fileset is available for prior versions
Reported By - Narendra Bhati ( R00t Sh3ll)
Security Analyst @ Suma Soft Pvt. Ltd. , Pune ( India )IT Risk & Security Management Services , Pune ( India)
Facebook - https://facebook.com/narendradewsoft
twitter - https://www.twitter.com/NarendraBhatiNB
Blog - http://hacktivity.websecgeeks.com
Email - bhati.contact@gmail.com
-----------------------------------------------------------------------------------------------
Advisory Details:
Narendra Bhati discovered vulnerability in MODX Revolution, which can be exploited to perform Cross-Site Scripting (XSS) attacks & Along With Bypassing CSRF Tokens Protection ,Its allow an attacker to perform A CSRF Attack alosing With XSS to take over victim account by changin promary email address , Sending forged request Etc , Tricking an admin to attack on their own users by sending specially crafter malicous payload as CSRF Attack
1) Cross Site Request Forgery Protection (CSRF) Tokens Bypassing in Modx Revolution
The vulnerability exists due to insufficient validation of csrftokens ["HTTP_MODHAUTH] at server side which allow an attacker to Perform CSRF Attack by bypassing CSRF Protection Mechanism To take over victim account , Trick him to send malicious request Etc.
------------------------------------------------------------------------------------
2) Reflected Cross-Site Scripting (XSS) in MODX Revolution
The vulnerability exists due to insufficient sanitization of input data passed via the "context_key" HTTP GET parameter to "http://127.0.0.1/day/modx/manager/index.php?a=55&class_key=modStaticResource&context_key=" URL. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
This vulnerability can be used against website administrator to perform phishing attacks, steal potentially sensitive data and gain complete control over web application.
The exploitation example below uses the ""></script><img src=x onerror=prompt(/XSS/)>" JavaScript function to display "/XSS/" word:
Vulnerable URL - http://127.0.0.1/day/modx/manager/index.php?a=55&class_key=modStaticResource&context_key="></script><img src=x onerror=prompt(/XSS/)>
Vulnerable Parameter - "context_key"
XSS Payload - "></script><img src=x onerror=prompt(/XSS/)>
"></script><img src=x onerror=prompt(document.cookie)>
-----------------------------------------------------------------------------------------------
3) Stored Cross-Site Scripting (XSS) in MODX Revolution
The vulnerability exists due to insufficient sanitization of input data passed via the "context" HTTP POST parameter to " http://127.0.0.1/day/modx/manager/index.php?id=1" URL. A local attacker [Authenticated User] can execute arbitrary HTML and script code in browser in context of the vulnerable website.
This vulnerability can be used against website visitors to perform phishing attacks, steal potentially sensitive data and gain complete control over web application.
The exploitation example below uses the "<script>alert(1)</script>" JavaScript function to display "1" word:
Vulnerable URL - http://127.0.0.1/day/modx/manager/index.php?id=1
Vulnerable Parameter - "context"
XSS Payload - <script>alert(1)</script>
Note - This Stored XSS Was more critical because there was a CSRF protection vulnerability also , which allow an attacker to trick an administrator To Send Unwated Request for Stored XSS , which will directly attack to the Visitors ,
-----------------------------------------------------------------------------------------------
Solution:
Upgrade to MODX Revolution 2.2.15. Due to the nature of this issue and the number of files requiring changes the solution is to upgrade. No installable patch or fileset is available for prior versions
More Information:
Public Advisory By Vendor :- http://forums.modx.com/thread/92152/critical-login-xss-csrf-revolution-2-2-1-4-and-prior
Public Disclosure With Tecnical Details - http://hacktivity.websecgeeks.com/modx-csrf-and-xss/
-----------------------------------------------------------------------------------------------