ModX Revolution 2.3.5-pl: Reflected Cross Site Scripting VulnerabilityDate: 2015-08-17 09:27:03
|Affected Product:||ModX Revolution 2.3.5-pl|
|Fixed Version Link:||2.3.6|
|Vulnerability Type:||Reflected XSS|
|Reported to vendor:||07/14/2015|
|Disclosed to public:||08/17/2015|
|Release mode:||Full disclosure|
|Credits||Tim Coen of Curesec GmbH|
2. Vulnerability Description
The attack can be exploited by getting the victim to click a link or visit an attacker controlled website.
3. Proof of Concept
The injection takes place into the file GET argument, which is echoed inside script tags.
This issue was not fixed by the vendor.
Update: According to the vendor, the issue was fixed on github at the day of our report. The fix was part of the 2.3.6 release on August the 18th 2015.
5. Report Timeline
|07/14/2015||Informed Vendor about Issue (no reply)|
|08/13/2015||Contacted Vendor again (no reply)|
|08/17/2015||Disclosed to public||08/18/2015||Vendor Releases Fix|