Vulnerability Details : CVE-2019-1010178
Potential exploit
Fred MODX Revolution < 1.0.0-beta5 is affected by: Incorrect Access Control - CWE-648. The impact is: Remote Code Execution. The component is: assets/components/fred/web/elfinder/connector.php. The attack vector is: Uploading a PHP file or change data in the database. The fixed version is: https://github.com/modxcms/fred/commit/139cefac83b2ead90da23187d92739dec79d3ccd and https://github.com/modxcms/fred/commit/01f0a3d1ae7f3970639c2a0db1887beba0065246.
Vulnerability category: Execute code
Products affected by CVE-2019-1010178
- cpe:2.3:a:modx:fred:1.0.0:rc:*:*:*:modx:*:*
- cpe:2.3:a:modx:fred:1.0.0:rc2:*:*:*:modx:*:*
- cpe:2.3:a:modx:fred:1.0.0:-:*:*:*:modx:*:*
- cpe:2.3:a:modx:fred:1.0.0:pl:*:*:*:modx:*:*
- cpe:2.3:a:modx:fred:1.0.0:beta4:*:*:*:modx:*:*
- cpe:2.3:a:modx:fred:1.0.0:rc1:*:*:*:modx:*:*
- cpe:2.3:a:modx:fred:1.0.0:beta2:*:*:*:modx:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-1010178
2.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-1010178
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-1010178
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
-
The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.Assigned by: josh@bress.net (Secondary)
References for CVE-2019-1010178
-
https://www.youtube.com/watch?v=vOlw2DP9WbE
Meet #Fred - полноценный бекдор для CMS #MODX Revolution - YouTubeExploit;Third Party Advisory
Jump to