Executive Summary

Informations
Name CVE-2013-0209 First vendor Publication 2013-01-22
Vendor Cve Last vendor Modification 2013-01-29

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0209

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18080
 
Oval ID: oval:org.mitre.oval:def:18080
Title: DSA-2611-1 movabletype-opensource - several
Description: An input sanitation problem has been found in upgrade functions of movabletype-opensource, a web-based publishing platform. Using carefully crafted requests to the mt-upgrade.cgi file, it would be possible to inject OS command and SQL queries.
Family: unix Class: patch
Reference(s): DSA-2611-1
CVE-2013-0209
Version: 7
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): movabletype-opensource
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 33

ExploitDB Exploits

id Description
2013-01-07 Movable Type 4.2x, 4.3x Web Upgrade Remote Code Execution

Snort® IPS/IDS

Date Description
2014-01-10 Moveable Type unauthenticated remote command execution attempt
RuleID : 25528 - Revision : 6 - Type : SERVER-WEBAPP

Metasploit Database

id Description
2013-01-07 Movable Type 4.2x, 4.3x Web Upgrade Remote Code Execution

Nessus® Vulnerability Scanner

Date Description
2013-01-25 Name : A blog running on the remote web server is affected by a command execution vu...
File : movabletype_mt_upgrade_command_exec.nasl - Type : ACT_DESTRUCTIVE_ATTACK
2013-01-23 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2611.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://www.movabletype.org/2013/01/movable_type_438_patch.html
MISC http://www.sec-1.com/blog/?p=402
http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec...
MLIST http://openwall.com/lists/oss-security/2013/01/22/3

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2021-05-04 12:23:15
  • Multiple Updates
2021-04-22 01:27:47
  • Multiple Updates
2020-05-23 13:17:01
  • Multiple Updates
2020-05-23 00:35:40
  • Multiple Updates
2016-04-26 22:39:12
  • Multiple Updates
2014-02-17 11:15:22
  • Multiple Updates
2014-01-19 21:29:06
  • Multiple Updates
2013-05-10 22:27:58
  • Multiple Updates
2013-01-30 00:19:59
  • Multiple Updates
2013-01-23 21:21:06
  • Multiple Updates
2013-01-23 13:22:03
  • First insertion