In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
References
Link | Resource |
---|---|
https://citadelo.com/en/2017/04/modx-revolution-cms/ | Exploit Third Party Advisory |
https://github.com/modxcms/revolution/pull/13422 | Third Party Advisory |
https://github.com/modxcms/revolution/pull/13428 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:23:08
Updated: 2022-10-03T16:23:08
Reserved: 2022-10-03T00:00:00
Link: CVE-2017-9067
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-05-18T16:29:00.157
Modified: 2017-05-31T15:07:55.447
Link: CVE-2017-9067
JSON object: View
Redhat Information
No data.
CWE