Summary
This host is installed with MODx and is prone to brute force and path disclosure vulnerabilities.
Impact
Successful exploitation will allow the attacker to obtain sensitive information that could aid in further attacks.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
- In login form (manager/index.php) there is no reliable protection from brute force attacks.
- Insufficient error checking, allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message.
Affected
MODx CMF version 2.x (Revolution)
MODx CMS version 1.x (Evolution)
References
Severity
Classification
-
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- @Mail 'MailType' Parameter Cross Site Scripting Vulnerability
- Apache Tomcat NIO Connector Denial of Service Vulnerability
- A4Desk Event Calendar 'eventid' Parameter SQL Injection Vulnerability
- APC PowerChute Network Shutdown 'security/applet' Cross Site Scripting Vulnerability
- appRain CMF 'uploadify.php' Remote Arbitrary File Upload Vulnerability