MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://rudnkh.me/posts/critical-vulnerability-in-modx-revolution-2-6-4 | third party advisory exploit |
https://github.com/modxcms/revolution/pull/13979 | third party advisory exploit |
https://github.com/a2u/CVE-2018-1000207 | third party advisory broken link |
https://github.com/modxcms/revolution/commit/06bc94257408f6a575de20ddb955aca505ef6e68 | third party advisory patch |