MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4520 | MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68. |
Github GHSA |
GHSA-m899-6mh4-mpc5 | MODX Revolution Incorrect Access Control vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:46.808Z
Reserved: 2018-07-09T00:00:00
Link: CVE-2018-1000207
No data.
Status : Modified
Published: 2018-07-13T18:29:00.270
Modified: 2024-11-21T03:39:56.350
Link: CVE-2018-1000207
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA