Vulnerability Details CVE-2018-1000207
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.04
EPSS Ranking 88.0%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 6.5
Products affected by CVE-2018-1000207
-
cpe:2.3:a:modx:modx_revolution:1.5.1
-
cpe:2.3:a:modx:modx_revolution:1.5.2
-
cpe:2.3:a:modx:modx_revolution:1.6.1
-
cpe:2.3:a:modx:modx_revolution:1.6.2
-
cpe:2.3:a:modx:modx_revolution:1.6.3
-
cpe:2.3:a:modx:modx_revolution:1.6.4
-
cpe:2.3:a:modx:modx_revolution:1.6.5
-
cpe:2.3:a:modx:modx_revolution:1.7.0
-
cpe:2.3:a:modx:modx_revolution:1.7.1
-
cpe:2.3:a:modx:modx_revolution:1.7.2
-
cpe:2.3:a:modx:modx_revolution:1.7.3
-
cpe:2.3:a:modx:modx_revolution:1.8.0
-
cpe:2.3:a:modx:modx_revolution:1.8.1
-
cpe:2.3:a:modx:modx_revolution:1.9.0
-
cpe:2.3:a:modx:modx_revolution:1.9.1
-
cpe:2.3:a:modx:modx_revolution:1.9.2
-
cpe:2.3:a:modx:modx_revolution:1.9.3
-
cpe:2.3:a:modx:modx_revolution:1.9.4
-
cpe:2.3:a:modx:modx_revolution:1.9.5
-
cpe:2.3:a:modx:modx_revolution:1.9.6
-
cpe:2.3:a:modx:modx_revolution:1.9.7
-
cpe:2.3:a:modx:modx_revolution:2.0.0
-
cpe:2.3:a:modx:modx_revolution:2.0.1
-
cpe:2.3:a:modx:modx_revolution:2.0.2
-
cpe:2.3:a:modx:modx_revolution:2.0.3
-
cpe:2.3:a:modx:modx_revolution:2.0.4
-
cpe:2.3:a:modx:modx_revolution:2.0.5
-
cpe:2.3:a:modx:modx_revolution:2.0.6
-
cpe:2.3:a:modx:modx_revolution:2.0.7
-
cpe:2.3:a:modx:modx_revolution:2.0.8
-
cpe:2.3:a:modx:modx_revolution:2.1.0
-
cpe:2.3:a:modx:modx_revolution:2.1.1
-
cpe:2.3:a:modx:modx_revolution:2.1.2
-
cpe:2.3:a:modx:modx_revolution:2.1.3
-
cpe:2.3:a:modx:modx_revolution:2.1.4
-
cpe:2.3:a:modx:modx_revolution:2.1.5
-
cpe:2.3:a:modx:modx_revolution:2.2.0
-
cpe:2.3:a:modx:modx_revolution:2.2.1
-
cpe:2.3:a:modx:modx_revolution:2.2.10
-
cpe:2.3:a:modx:modx_revolution:2.2.11
-
cpe:2.3:a:modx:modx_revolution:2.2.12
-
cpe:2.3:a:modx:modx_revolution:2.2.13
-
cpe:2.3:a:modx:modx_revolution:2.2.14
-
cpe:2.3:a:modx:modx_revolution:2.2.15
-
cpe:2.3:a:modx:modx_revolution:2.2.16
-
cpe:2.3:a:modx:modx_revolution:2.2.2
-
cpe:2.3:a:modx:modx_revolution:2.2.3
-
cpe:2.3:a:modx:modx_revolution:2.2.4
-
cpe:2.3:a:modx:modx_revolution:2.2.5
-
cpe:2.3:a:modx:modx_revolution:2.2.6
-
cpe:2.3:a:modx:modx_revolution:2.2.7
-
cpe:2.3:a:modx:modx_revolution:2.2.8
-
cpe:2.3:a:modx:modx_revolution:2.2.9
-
cpe:2.3:a:modx:modx_revolution:2.3.0
-
cpe:2.3:a:modx:modx_revolution:2.3.1
-
cpe:2.3:a:modx:modx_revolution:2.3.2
-
cpe:2.3:a:modx:modx_revolution:2.3.3
-
cpe:2.3:a:modx:modx_revolution:2.3.4
-
cpe:2.3:a:modx:modx_revolution:2.3.5
-
cpe:2.3:a:modx:modx_revolution:2.3.6
-
cpe:2.3:a:modx:modx_revolution:2.4.0
-
cpe:2.3:a:modx:modx_revolution:2.4.1
-
cpe:2.3:a:modx:modx_revolution:2.4.2
-
cpe:2.3:a:modx:modx_revolution:2.4.3
-
cpe:2.3:a:modx:modx_revolution:2.4.4
-
cpe:2.3:a:modx:modx_revolution:2.5.0
-
cpe:2.3:a:modx:modx_revolution:2.5.1
-
cpe:2.3:a:modx:modx_revolution:2.5.2
-
cpe:2.3:a:modx:modx_revolution:2.5.3
-
cpe:2.3:a:modx:modx_revolution:2.5.4
-
cpe:2.3:a:modx:modx_revolution:2.5.5
-
cpe:2.3:a:modx:modx_revolution:2.5.6
-
cpe:2.3:a:modx:modx_revolution:2.5.7
-
cpe:2.3:a:modx:modx_revolution:2.5.8
-
cpe:2.3:a:modx:modx_revolution:2.6.0
-
cpe:2.3:a:modx:modx_revolution:2.6.1
-
cpe:2.3:a:modx:modx_revolution:2.6.2
-
cpe:2.3:a:modx:modx_revolution:2.6.3
-
cpe:2.3:a:modx:modx_revolution:2.6.4