Vulnerability Description
setup/controllers/language.php in MODX Revolution 2.5.4-pl and earlier does not properly constrain the language parameter, which allows remote attackers to conduct Cookie-Bombing attacks and cause a denial of service (cookie quota exhaustion), or conduct HTTP Response Splitting attacks with resultant XSS, via an invalid parameter value.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Modx | Modx Revolution | <= 2.5.4 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97228Third Party AdvisoryVDB Entry
- https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20DisclosuExploitTechnical DescriptionThird Party Advisory
- http://www.securityfocus.com/bid/97228Third Party AdvisoryVDB Entry
- https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20DisclosuExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2017-7320?
CVE-2017-7320 is a vulnerability with a CVSS score of 6.1 (MEDIUM). setup/controllers/language.php in MODX Revolution 2.5.4-pl and earlier does not properly constrain the language parameter, which allows remote attackers to conduct Cookie-Bombing attacks and cause a d...
How severe is CVE-2017-7320?
CVE-2017-7320 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7320?
Check the references section above for vendor advisories and patch information. Affected products include: Modx Modx Revolution.