CVE-2015-1592 – SixApart MovableType < 5.2.12 - Storable Perl Code Execution
https://notcve.org/view.php?id=CVE-2015-1592
Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors. Movable Type Pro, Open Source, y Advanced anterior a 5.2.12 y Pro y Advanced 6.0.x anterior a 6.0.7 no utiliza correctamente la función Storable::thaw de Perl, lo que permite a atacantes remotos incluir y ejecutar ficheros locales de Perl arbitrarios y posiblemente ejecutar código arbitrario a través de vectores no especificados. • https://www.exploit-db.com/exploits/41697 http://www.openwall.com/lists/oss-security/2015/02/12/17 http://www.openwall.com/lists/oss-security/2015/02/12/2 http://www.securityfocus.com/bid/72606 http://www.securitytracker.com/id/1031777 https://exchange.xforce.ibmcloud.com/vulnerabilities/100912 https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html https://www.debian.org/security/2015/dsa-3183 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2014-9057
https://notcve.org/view.php?id=CVE-2014-9057
SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en la interfaz XML-RPC en Movable Type anterior a 5.18, 5.2.x anterior a 5.2.11, y 6.x anterior a 6.0.6 permite a atacantes remotos ejecutar comandos SQL arbitrarios a través de vectores no especificados. • http://secunia.com/advisories/61227 https://movabletype.org/documentation/appendices/release-notes/6.0.6.html https://movabletype.org/news/2014/12/6.0.6.html https://www.debian.org/security/2015/dsa-3183 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2014-5313
https://notcve.org/view.php?id=CVE-2014-5313
Cross-site scripting (XSS) vulnerability in the management page in Six Apart Movable Type before 5.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en la página de gestión en Six Apart Movable Type anterior a 5.2 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. • http://jvn.jp/en/jp/JVN73357573/370331/index.html http://jvn.jp/en/jp/JVN73357573/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000104 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2014-0977
https://notcve.org/view.php?id=CVE-2014-0977
Cross-site scripting (XSS) vulnerability in the Rich Text Editor in Movable Type 5.0x, 5.1x before 5.161, 5.2.x before 5.2.9, and 6.0.x before 6.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad cross-site scripting (XSS) en Rich Text Editor de Movable Type 5.0x, 5.1x anteriores a 5.161, 5.2. anteriores a 5.2.9 y 6.0.x anteriores a 6.0.1 permite a atacantes remotos inyectar script web o HTML a través de vectores no especificados. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734304 http://movabletype.org/news/2013/11/movable_type_601_529_and_5161_released_to_close_security_vul.html http://seclists.org/oss-sec/2014/q1/24 http://seclists.org/oss-sec/2014/q1/36 http://secunia.com/advisories/56295 http://secunia.com/advisories/56405 http://www.debian.org/security/2014/dsa-2841 http://www.securityfocus.com/bid/64657 http://www.securitytracker.com/id/1029588 https://exchange.xforce.ibmcloud& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2013-0209 – Movable Type 4.2x/4.3x - Web Upgrade Remote Code Execution
https://notcve.org/view.php?id=CVE-2013-0209
lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code. lib/MT/Upgrade.pm en mt-upgrade.cgi en Movable Type v4.2x y v4.3x hasta v4.38 no requiere autenticación para las peticiones a las funciones de migración de base de datos, lo que permite a atacantes remotos llevar a cabo inyecciones eval y ataques de inyección SQL a través de parámetros especialmente elaborados, como se demuestra por un ataque de inyección eval contra la función core_drop_meta_for_table, dando lugar a la ejecución de código Perl. • https://www.exploit-db.com/exploits/24321 http://openwall.com/lists/oss-security/2013/01/22/3 http://www.movabletype.org/2013/01/movable_type_438_patch.html http://www.sec-1.com/blog/?p=402 http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt • CWE-287: Improper Authentication •