Executive Summary

Summary
Title movabletype-opensource security update
Informations
Name DSA-2611 First vendor Publication 2013-01-22
Vendor Debian Last vendor Modification 2013-01-22
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

An input sanitation problem has been found in upgrade functions of movabletype-opensource, a web-based publishing platform. Using carefully crafted requests to the mt-upgrade.cgi file, it would be possible to inject OS command and SQL queries.

For the stable distribution (squeeze), this problem has been fixed in version 4.3.8+dfsg-0+squeeze3.

For the testing distribution (wheezy), this problem has been fixed in version 5.1.2+dfsg-1.

For the unstable distribution (sid), this problem has been fixed in version 5.1.2+dfsg-1.

We recommend that you upgrade your movabletype-opensource packages.

Original Source

Url : http://www.debian.org/security/2013/dsa-2611

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18080
 
Oval ID: oval:org.mitre.oval:def:18080
Title: DSA-2611-1 movabletype-opensource - several
Description: An input sanitation problem has been found in upgrade functions of movabletype-opensource, a web-based publishing platform. Using carefully crafted requests to the mt-upgrade.cgi file, it would be possible to inject OS command and SQL queries.
Family: unix Class: patch
Reference(s): DSA-2611-1
CVE-2013-0209
Version: 7
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): movabletype-opensource
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 33

ExploitDB Exploits

id Description
2013-01-07 Movable Type 4.2x, 4.3x Web Upgrade Remote Code Execution

Snort® IPS/IDS

Date Description
2014-01-10 Moveable Type unauthenticated remote command execution attempt
RuleID : 25528 - Revision : 6 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2013-01-25 Name : A blog running on the remote web server is affected by a command execution vu...
File : movabletype_mt_upgrade_command_exec.nasl - Type : ACT_DESTRUCTIVE_ATTACK
2013-01-23 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2611.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 11:31:36
  • Multiple Updates
2013-01-23 21:21:57
  • Multiple Updates
2013-01-23 13:23:12
  • Multiple Updates
2013-01-22 09:19:21
  • First insertion