Описание
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.
Ссылки
- Third Party AdvisoryVDB Entry
- ExploitTechnical DescriptionThird Party Advisory
- Third Party AdvisoryVDB Entry
- ExploitTechnical DescriptionThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.5.4 (включая)
cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*
EPSS
Процентиль: 78%
0.01126
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.
EPSS
Процентиль: 78%
0.01126
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
NVD-CWE-noinfo