Cross-site scripting (XSS) vulnerability in index.php in MODx CMS 0.9.6.2 and earlier allows remote attackers to inject arbitrary web script or HTML via a JavaScript event in the username field, possibly related to snippet.ditto.php. NOTE: some sources list the id parameter as being affected, but this is probably incorrect based on the original disclosure.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/7204 | exploit |
http://www.vupen.com/english/advisories/2008/3236 | vdb entry |
http://securityreason.com/securityalert/4940 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46796 | vdb entry |
http://svn.modxcms.com/svn/tattoo/tattoo/releases/0.9.6.3/install/changelog.txt | |
http://www.securityfocus.com/bid/32436 | vdb entry exploit |