Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple vulnerabilities in Movable Type < 3.2
Detailed Explanation for this Vulnerability Assessment
The remote web server contains CGI scripts that are prone to arbitrary
remote command execution, information disclosure, and cross-site
The remote host is running Movable Type, a blog software written in
The installed version of Movable Type permits a possible hacker to enumerate
valid usernames because its password reset functionality returns
different errors depending on whether the supplied username exists
permits privileged users to upload files with arbitrary extensions,
possibly outside the web server's document directory
and fails to
sanitize certain fields when creating new blog entries of malicious
HTML and script code before using them to generate dynamic web pages.
Upgrade to Movable Type 3.2 or later and grant only trusted users the
ability to upload files via the administrative interface.
Network Security Threat Level:
Low / CVSS Base Score : 3
Networks Security ID: 14910, 14911, 14912
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
No Discussions have been posted on this vulnerability.