Description
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-18006 | MODX Revolution Directory Traversal Vulnerability |
Github GHSA |
GHSA-cgrv-6h2h-6f7v | MODX Revolution Directory Traversal Vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T20:32:21.759Z
Reserved: 2017-05-18T00:00:00.000Z
Link: CVE-2017-9067
No data.
Status : Modified
Published: 2017-05-18T16:29:00.157
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-9067
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA