Описание
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
Ссылки
- Broken LinkThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Broken LinkThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.6.4 (включая)
cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.03821
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-732
Связанные уязвимости
CVSS3: 7.2
github
больше 3 лет назад
MODX Revolution Incorrect Access Control vulnerability
EPSS
Процентиль: 88%
0.03821
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-732