In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T20:32:21.759Z
Reserved: 2017-05-18T00:00:00Z
Link: CVE-2017-9067

No data.

Status : Modified
Published: 2017-05-18T16:29:00.157
Modified: 2024-11-21T03:35:15.563
Link: CVE-2017-9067

No data.