Cleanup
This commit is contained in:
+10
-12
@@ -1,26 +1,24 @@
|
||||
title: CVE-2010-5278 exploitation attempt
|
||||
title: CVE-2010-5278 Exploitation Attempt
|
||||
id: 55a72ccd-4f16-42a7-afc8-f7958035bf90
|
||||
author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
date: 2021/08/25
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in manager/controllers/default/resource/tvs.php
|
||||
in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled,
|
||||
allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key
|
||||
parameter.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/34788
|
||||
- https://www.cvedetails.com/cve/CVE-2010-5278
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
- https://www.exploit-db.com/exploits/34788
|
||||
- https://www.cvedetails.com/cve/CVE-2010-5278
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../windows/win.ini%00
|
||||
c-uri|contains: '/manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../windows/win.ini%00'
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
Reference in New Issue
Block a user