First published: Thu May 18 2017(Updated: )
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MODx Revolution | =2.5.6 | |
PHP | =5.3.3 | |
composer/modx/revolution | <2.5.7 | 2.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9067 is considered a critical vulnerability as it allows attackers to execute arbitrary files on the web server.
To fix CVE-2017-9067, upgrade MODX Revolution to version 2.5.7 or later and ensure PHP is not at version 5.3.3.
CVE-2017-9067 affects MODX Revolution versions up to 2.5.6 when running on PHP version 5.3.3.
An attacker can perform directory traversal attacks to include and execute arbitrary files on the server.
If you have updated MODX Revolution to version 2.5.7 or higher and are using a secure PHP version, then CVE-2017-9067 should no longer pose a threat.