// For flags

CVE-2021-20837

Movable Type 7 r.5002 - XMLRPC API OS Command Injection

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

5
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.

Movable Type 7 versiones r.5002 y anteriores (Movable Type 7 Series), Movable Type versiones 6.8.2 y anteriores (Movable Type 6 Series), Movable Type Advanced 7 versiones r.5002 y anteriores (Movable Type Advanced 7 Series), Movable Type Advanced versiones 6.8.2 y anteriores (Movable Type Advanced 6 Series), Movable Type Premium versiones 1.46 y anteriores, y Movable Type Premium Advanced versiones 1.46 y anteriores, permiten a atacantes remotos ejecutar comandos arbitrarios del sistema operativo por medio de vectores no especificados. Tenga en cuenta que todas las versiones de Movable Type vectores no especificados 4.0 o posteriores, incluidas las versiones sin soporte (End-of-Life, EOL), también están afectadas por esta vulnerabilidad

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-17 CVE Reserved
  • 2021-10-26 CVE Published
  • 2021-10-29 First Exploit
  • 2024-08-03 CVE Updated
  • 2024-11-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
<= 1.46
Search vendor "Sixapart" for product "Movable Type" and version " <= 1.46"
premium
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
<= 1.46
Search vendor "Sixapart" for product "Movable Type" and version " <= 1.46"
premium_advanced
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 4.0 <= 6.3.11
Search vendor "Sixapart" for product "Movable Type" and version " >= 4.0 <= 6.3.11"
-
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 6.5.0 <= 6.8.2
Search vendor "Sixapart" for product "Movable Type" and version " >= 6.5.0 <= 6.8.2"
-
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 6.5.0 <= 6.8.2
Search vendor "Sixapart" for product "Movable Type" and version " >= 6.5.0 <= 6.8.2"
advanced
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 7.0 <= 7.8.1
Search vendor "Sixapart" for product "Movable Type" and version " >= 7.0 <= 7.8.1"
-
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 7.0 <= 7.8.1
Search vendor "Sixapart" for product "Movable Type" and version " >= 7.0 <= 7.8.1"
advanced
Affected