First published: Thu May 18 2017(Updated: )
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MODx Revolution | <=2.5.6 | |
composer/modx/revolution | <2.5.7 | 2.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9071 has been classified as a medium severity vulnerability due to its potential for exploitation via XSS.
To mitigate CVE-2017-9071, upgrade to MODX Revolution version 2.5.7 or later.
CVE-2017-9071 can enable attackers to perform Cross-Site Scripting (XSS) attacks through crafted HTTP Host header injections.
CVE-2017-9071 affects all versions of MODX Revolution prior to version 2.5.7.
CVE-2017-9071 is not directly exploitable on its own and requires additional vulnerabilities, such as Cache Poisoning, to be effective.