CVE-2014-8773

MODX Revolution 2.x before 2.2.15 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism by (1) omitting the CSRF token or via a (2) long string in the CSRF token parameter.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:modx:modx_revolution:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:modx:modx_revolution:2.2.5:*:*:*:*:*:*:*

Information

Published : 2014-12-03 10:59

Updated : 2019-10-22 10:23


NVD link : CVE-2014-8773

Mitre link : CVE-2014-8773


JSON object : View

CWE
CWE-352

Cross-Site Request Forgery (CSRF)

Advertisement

dedicated server usa

Products Affected

modx

  • modx_revolution