Description
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.
Remediation
References
Related Vulnerabilities
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-34429)
WordPress Plugin UK Cookie Cross-Site Request Forgery (1.1)
WordPress Plugin WP Cerber Security, Anti-spam & Malware Scan Security Bypass (8.9)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4308)