First published: Tue Jul 23 2019(Updated: )
MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
MODx Revolution | <=2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1010123 is considered critical due to the potential for unrestricted file uploads.
To fix CVE-2019-1010123, update MODX Revolution Gallery to a version later than 1.7.0 that addresses this vulnerability.
CVE-2019-1010123 allows attackers to upload files with dangerous types, such as executable scripts, due to inadequate filtering of user input.
The attack vector for CVE-2019-1010123 is through web requests made to the /assets/ directory.
CVE-2019-1010123 affects MODX Revolution versions up to and including 2.6.4.