Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p2j4-vrgx-96qg

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.7

Описание

MODX Revolution XSS via HTTP Host header

In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.

Пакеты

Наименование

modx/revolution

composer
Затронутые версииВерсия исправления

< 2.5.7

2.5.7

EPSS

Процентиль: 53%
0.00301
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.7
nvd
больше 8 лет назад

In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.

EPSS

Процентиль: 53%
0.00301
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-79