### [CVE-2024-42007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42007) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description SPX (aka php-spx) through 0.4.15 allows SPX_UI_URI Directory Traversal to read arbitrary files. ### POC #### Reference - https://www.vicarius.io/vsociety/posts/journey-to-discovery-and-exploitation-of-path-traversal-in-php-spx-cve-2024-42007 #### Github - https://github.com/BubblyCola/CVE_2024_42007 - https://github.com/EssenceCyber/Exploit-List - https://github.com/MelvinM8/OSCP - https://github.com/Mr-Tree-S/POC_EXP - https://github.com/plzheheplztrying/cve_monitor