First published: Thu Jul 13 2017(Updated: )
MODX Revolution version 2.x - 2.5.6 is vulnerable to blind SQL injection caused by improper sanitization by the escape method resulting in authenticated user accessing database and possibly escalating privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/modx/revolution | >=2.0.0<=2.5.6 | 2.6.0 |
MODX | =2.0.0 | |
MODX | =2.0.0-rc1 | |
MODX | =2.0.0-rc2 | |
MODX | =2.0.0-rc3 | |
MODX | =2.0.1 | |
MODX | =2.1.0 | |
MODX | =2.1.0-p12 | |
MODX | =2.1.1 | |
MODX | =2.1.1-p12 | |
MODX | =2.1.2 | |
MODX | =2.1.3 | |
MODX | =2.1.4 | |
MODX | =2.1.5 | |
MODX | =2.2.0 | |
MODX | =2.2.0-rc1 | |
MODX | =2.2.0-rc2 | |
MODX | =2.2.0-rc3 | |
MODX | =2.2.1 | |
MODX | =2.2.2 | |
MODX | =2.2.3 | |
MODX | =2.2.4 | |
MODX | =2.2.5 | |
MODX | =2.2.6 | |
MODX | =2.2.7 | |
MODX | =2.2.8 | |
MODX | =2.2.9 | |
MODX | =2.3.0 | |
MODX | =2.3.1 | |
MODX | =2.4.0 | |
MODX | =2.4.1 | |
MODX | =2.5.0 | |
MODX | =2.5.1 | |
MODX | =2.5.2 | |
MODX | =2.5.3 | |
MODX | =2.5.4 | |
MODX | =2.5.5 | |
MODX | =2.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-1000067 is classified as high due to potential exploitation by authenticated users to execute blind SQL injections.
To fix CVE-2017-1000067, upgrade MODX Revolution to version 2.6.0 or later.
Versions of MODX Revolution from 2.0.0 up to 2.5.6 are affected by CVE-2017-1000067.
CVE-2017-1000067 allows for blind SQL injection attacks that can lead to unauthorized database access and privilege escalation.
Yes, CVE-2017-1000067 requires an authenticated user to exploit the vulnerability.