First published: Fri Jul 13 2018(Updated: )
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/modx/revolution | <=2.6.4 | 2.7.0 |
MODx Revolution | <=2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000207 is classified as a medium severity vulnerability due to its potential to create files with custom content.
To mitigate CVE-2018-1000207, upgrade your MODX Revolution version to 2.6.5 or later.
CVE-2018-1000207 is caused by incorrect access control in the filtering of user parameters within the phpthumb class.
CVE-2018-1000207 affects all versions of MODX Revolution up to and including 2.6.4.
Yes, CVE-2018-1000207 can be exploited via web requests, making it a remote code execution vulnerability.