Description
|
|
Some vulnerabilities have been discovered in MODx, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.
1) Input passed via the "modahsh" parameter and via arbitrary parameters to manager/index.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Successful exploitation of this vulnerability requires that the victim is logged out.
2) Input passed via the "class_key" parameter to manager/controllers/default/resource/tvs.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal sequences and URL-encoded NULL bytes.
Successful exploitation of this vulnerability requires that "magic_quotes_gpc" is disabled
The vulnerabilities are confirmed in version 2.0.2-pl. Other versions may also be affected.
|