Description
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-18010 | MODX Revolution XSS via HTTP Host header |
Github GHSA |
GHSA-p2j4-vrgx-96qg | MODX Revolution XSS via HTTP Host header |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T04:20:42.722Z
Reserved: 2017-05-18T00:00:00.000Z
Link: CVE-2017-9071
No data.
Status : Modified
Published: 2017-05-18T16:29:00.283
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-9071
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA