MODx < 2.0.3-pl modahsh Parameter XSS

low Nessus Plugin ID 56565

Synopsis

The remote web server contains a PHP script that is vulnerable to a reflected cross-site scripting attack.

Description

The version of MODx hosted on the remote web server fails to sanitize the 'modahsh' parameter of the 'manager/index.php' script before using it to generate dynamic HTML.

By tricking someone into clicking on a specially crafted link, an attacker may be able exploit this to inject arbitrary HTML and script code into a user's browser to be executed within the security context of the affected site.

Solution

Upgrade to MODx to 2.0.3 or later.

See Also

http://www.nessus.org/u?0493e3ff

Plugin Details

Severity: Low

ID: 56565

File Name: modx_202_xss.nasl

Version: 1.12

Type: remote

Published: 10/20/2011

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:modxcms:modxcms

Required KB Items: www/PHP, www/modx

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 9/30/2010

Vulnerability Publication Date: 9/28/2010

Exploitable With

Elliot (MODx Revolution 2.0.2-pl LFI)

Reference Information

CVE: CVE-2010-4883

BID: 43577

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990