SB2016111601 - PHP code injection in MODX Evolution



SB2016111601 - PHP code injection in MODX Evolution

Published: November 16, 2016 Updated: November 30, 2016

Security Bulletin ID SB2016111601
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) PHP code injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary SQL commands.

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the "ucfg" HTTP POST parameter to "/assets/snippets/ajaxSearch/classes/ajaxSearchConfig.class.inc.php" script. A remote attacker can send a specially crafted HTTP POST request and execute arbitrary SQL commands in database.

Successful exploitation of this vulnerability may allow an attacker to execute arbitrary PHP code on the target system, however requires valid user account.

Note: as of November 30, 2016 this vulnerability is being actively exploited in the wild.


Remediation

Install update from vendor's website.