First published: Sun Oct 07 2012(Updated: )
Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MODx Revolution | <=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5278 is classified as a high-severity vulnerability due to its ability to allow remote file access.
To mitigate CVE-2010-5278, upgrade MODx Revolution to version 2.0.2 or later with magic_quotes_gpc enabled.
CVE-2010-5278 allows attackers to read arbitrary files on the server, potentially leading to sensitive information exposure.
CVE-2010-5278 affects MODx Revolution version 2.0.2-pl and possibly earlier versions.
Attackers can exploit CVE-2010-5278 using directory traversal techniques by manipulating the class_key parameter.