Published:2009/01/09  Last Updated:2009/01/09

JVN#66828183
MODx cross-site request forgery vulnerability

Overview

MODx, an open source contents management system, contains a cross-site request forgery vulnerability.

Products Affected

  • MODx 0.9.6.1p2 and earlier

Description

MODx, an open source contents management system, contains a cross-site request forgery vulnerability.

Impact

A remote attacker may modify contents managed by MODx if the user views a malicious web page while logged in to MODx.

Solution

Update the software and change the configuration
Apply the latest update provided by the developer and change the configuration as follows.

  • After logging into the MODx administrative page, change the Referer check configuration to [Yes], which is [No] by default.
Workarounds
Users can mitigate this vulnerability by applying the following workarounds.
  • Do not click untrusted URL's while logged into MODx administrative page.
  • Log out immediately once the administrative operation is completed.
For more information, refer to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2009.01.09

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures

Credit

Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2008-5941
JVN iPedia JVNDB-2009-000004

Update History