// For flags

CVE-2022-45113

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.

Existe una validación inadecuada de la corrección sintáctica de la vulnerabilidad de entrada en la serie Movable Type. Hacer que un usuario acceda a una URL especialmente manipulada puede permitir que un atacante remoto no autenticado establezca una URL especialmente manipulada para la página Restablecer contraseña y realice un ataque de phishing. Los productos/versiones afectados son los siguientes: Movable Type 7 r.5301 y anteriores (Serie Movable Type 7), Movable Type Advanced 7 r.5301 y anteriores (Serie Movable Type Advanced 7), Movable Type 6.8.7 y anteriores (Movable Type 6), Movable Type Advanced 6.8.7 y anteriores (Movable Type Advanced 6 Series), Movable Type Premium 1.53 y anteriores, y Movable Type Premium Advanced 1.53 y anteriores.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-11-15 CVE Reserved
  • 2022-12-07 CVE Published
  • 2024-06-29 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
<= 1.53
Search vendor "Sixapart" for product "Movable Type" and version " <= 1.53"
premium
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
<= 1.53
Search vendor "Sixapart" for product "Movable Type" and version " <= 1.53"
premium_advanced
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 6.0 < 6.8.7
Search vendor "Sixapart" for product "Movable Type" and version " >= 6.0 < 6.8.7"
-
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 6.0 < 6.8.7
Search vendor "Sixapart" for product "Movable Type" and version " >= 6.0 < 6.8.7"
advanced
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 7.0 < 7.9.6
Search vendor "Sixapart" for product "Movable Type" and version " >= 7.0 < 7.9.6"
-
Affected
Sixapart
Search vendor "Sixapart"
Movable Type
Search vendor "Sixapart" for product "Movable Type"
>= 7.0 < 7.9.6
Search vendor "Sixapart" for product "Movable Type" and version " >= 7.0 < 7.9.6"
advanced
Affected