Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-5278 PoC — MODx Revolution 路径遍历漏洞

Source
Associated Vulnerability
Title:MODx Revolution 路径遍历漏洞 (CVE-2010-5278)
Description:MODx是一个开源的 PHP 应用框架,可以帮助使用者控制自己的网上内容。它是开发人员和高级用户理想的控制系统,任何人都可以使用 MODx 发布、更新、维护动态网站,或 html 静态页面的网站内容。 MODx Revolution 2.0.2-pl和较早版本中的manager/controllers/default/resource/tvs.php中存在目录遍历漏洞。当magic_quotes_gpc启用时,远程攻击者可利用该漏洞通过class_key参数中的..(点点),读取任意文件。
Description
A directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl and possibly earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter when magic_quotes_gpc is disabled.
File Snapshot

id: CVE-2010-5278 info: name: MODx manager - Local File Inclusion author: daffainfo severity: ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.