MODx login.php 'username' Parameter XSS

medium Nessus Plugin ID 51090

Synopsis

The remote web server hosts an application that is prone to a cross- site scripting attack.

Description

The installed version of MODx fails to adequately sanitize input passed to the 'username' parameter in the 'login.php' script before using it to generate dynamic HTML content.

An unauthenticated, remote attacker may be able to leverage this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site.

Although Nessus has not checked for it, the installed version is also likely to be affected by another cross-site scripting vulnerability involving the 'email' parameter.

Solution

Upgrade to 2.0.5-pl or later.

See Also

https://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4982.php

http://bugs.modx.com/issues/2918

Plugin Details

Severity: Medium

ID: 51090

File Name: modx_username_xss.nasl

Version: 1.13

Type: remote

Published: 12/9/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/a:modxcms:modxcms

Required KB Items: www/modx

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 12/8/2010

Vulnerability Publication Date: 12/6/2010

Reference Information

BID: 45215

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

SECUNIA: 42483