MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
References
Link | Resource |
---|---|
https://github.com/a2u/CVE-2018-1000207 | Broken Link Third Party Advisory |
https://github.com/modxcms/revolution/commit/06bc94257408f6a575de20ddb955aca505ef6e68 | Patch Third Party Advisory |
https://github.com/modxcms/revolution/pull/13979 | Exploit Third Party Advisory |
https://rudnkh.me/posts/critical-vulnerability-in-modx-revolution-2-6-4 | Exploit Third Party Advisory |
https://github.com/a2u/CVE-2018-1000207 | Broken Link Third Party Advisory |
https://github.com/modxcms/revolution/commit/06bc94257408f6a575de20ddb955aca505ef6e68 | Patch Third Party Advisory |
https://github.com/modxcms/revolution/pull/13979 | Exploit Third Party Advisory |
https://rudnkh.me/posts/critical-vulnerability-in-modx-revolution-2-6-4 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/a2u/CVE-2018-1000207 - Broken Link, Third Party Advisory | |
References | () https://github.com/modxcms/revolution/commit/06bc94257408f6a575de20ddb955aca505ef6e68 - Patch, Third Party Advisory | |
References | () https://github.com/modxcms/revolution/pull/13979 - Exploit, Third Party Advisory | |
References | () https://rudnkh.me/posts/critical-vulnerability-in-modx-revolution-2-6-4 - Exploit, Third Party Advisory |
Information
Published : 2018-07-13 18:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000207
Mitre link : CVE-2018-1000207
CVE.ORG link : CVE-2018-1000207
JSON object : View
Products Affected
modx
- modx_revolution
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource