Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pcqw-62rj-gj5j

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.

Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 95%
0.18602
Средний

Дефекты

CWE-22

Связанные уязвимости

nvd
больше 13 лет назад

Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 95%
0.18602
Средний

Дефекты

CWE-22