In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
References
Link Resource
https://citadelo.com/en/2017/04/modx-revolution-cms/ Exploit Patch Third Party Advisory
https://github.com/modxcms/revolution/pull/13426 Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:23:08

Updated: 2022-10-03T16:23:08

Reserved: 2022-10-03T00:00:00


Link: CVE-2017-9071

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-05-18T16:29:00.283

Modified: 2017-05-30T19:28:50.617


Link: CVE-2017-9071

JSON object: View

cve-icon Redhat Information

No data.

CWE