Summary
This host is installed with MODx and is prone to brute force and path disclosure vulnerabilities.
Impact
Successful exploitation will allow the attacker to obtain sensitive information that could aid in further attacks.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
- In login form (manager/index.php) there is no reliable protection from brute force attacks.
- Insufficient error checking, allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message.
Affected
MODx CMF version 2.x (Revolution)
MODx CMS version 1.x (Evolution)
References
Severity
Classification
-
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- Afian 'includer.php' Directory Traversal Vulnerability
- Alt-N WebAdmin Remote Source Code Information Disclosure Vulnerability
- @Mail WebMail Email Body HTML Injection Vulnerability
- 7Media Web Solutions EduTrac Directory Traversal Vulnerability