First published: Tue Jan 08 2008(Updated: )
Multiple directory traversal vulnerabilities in MODx Content Management System 0.9.6.1 allow remote attackers to (1) include and execute arbitrary local files via a .. (dot dot) in the as_language parameter to assets/snippets/AjaxSearch/AjaxSearch.php, reached through index-ajax.php; and (2) read arbitrary local files via a .. (dot dot) in the file parameter to assets/js/htcmime.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MODx CMS Evolution | =0.9.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0094 is classified as a high severity vulnerability due to its risk of allowing remote code execution and unauthorized file access.
To fix CVE-2008-0094, upgrade the MODx Content Management System to a version later than 0.9.6.1 which addresses these vulnerabilities.
CVE-2008-0094 can be exploited by remote attackers to execute arbitrary local files and read sensitive data through directory traversal techniques.
CVE-2008-0094 affects MODx Content Management System version 0.9.6.1 specifically.
You can identify if your site is affected by CVE-2008-0094 by checking if it is running MODx version 0.9.6.1 and performing vulnerability scans.