Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 8 Dec 2016 10:41:35 +0000
From: 陈瑞琦 <>
To: "" <>
Subject: CVE Request: file inclusion(traversal/manipulation) in modx
 revolution 2.5.1

I found a file inclusion(traversal/manipulation) vuln in modx revolution 2.5.1

Title: Path travel in modx version 2.5.1
Author: Chen Ruiqi,, @Codesafe Team
Download Site:<>
Vendor: modx
Vendor Contact:
MODX (originally MODx) is a free, open source content management system and web application framework for publishing content on the world wide web and intranets. MODX is licensed under the GPL, is written in the PHP programming language, and supports MySQL and Microsoft SQL Server as the database. It was awarded Packt Publishing's Most Promising Open Source Content Management System in 2007.[1](wiki)
By using relative paths and guessing locations on a server modx is installed on, an attacker can get the file system structure and delete any folder from a target server that the process running modx has permission. The attacker needs administrator privileges on the modx site to perform this attack.



update to version 2.5.2

Could you assign CVE ID for this?

Thank you

Chen Ruiqi
Codesafe Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.