Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Movable Type < 3.2 Multiple Vulnerabilities


Vulnerability Assessment Details

Movable Type < 3.2 Multiple Vulnerabilities

Vulnerability Assessment Summary
Checks for multiple vulnerabilities in Movable Type < 3.2

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains CGI scripts that are prone to arbitrary
remote command execution, information disclosure, and cross-site
scripting attacks.

Description :

The remote host is running Movable Type, a blog software written in
Perl.

The installed version of Movable Type permits a possible hacker to enumerate
valid usernames because its password reset functionality returns
different errors depending on whether the supplied username exists

permits privileged users to upload files with arbitrary extensions,
possibly outside the web server's document directory
and fails to
sanitize certain fields when creating new blog entries of malicious
HTML and script code before using them to generate dynamic web pages.

Solution :

Upgrade to Movable Type 3.2 or later and grant only trusted users the
ability to upload files via the administrative interface.

Network Security Threat Level:

Low / CVSS Base Score : 3
(AV:R/AC:H/Au:R/C:P/A:P/I:P/B:N)

Networks Security ID: 14910, 14911, 14912

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Supermicro X7SBU Socket Base LGA775 Xeon Server Mainboard DDR3 PCIe VGA 2x LAN
$87.3
Supermicro X7SBU Socket Base LGA775 Xeon Server Mainboard DDR3 PCIe VGA 2x LAN pictureDell PowerEdge R630 2x E5-2640v3 2.6GHz 8 Core 64GB 8x 600GB 15K 12Gb/s SAS H730
$5550.0
Dell PowerEdge R630 2x E5-2640v3 2.6GHz 8 Core 64GB 8x 600GB 15K 12Gb/s SAS H730 pictureDell PowerEdge M630 Blade 2x E5-2620v4 128GB 2x 1.2TB 10K 12Gb/s, H730, 57810-k
$3195.0
Dell PowerEdge M630 Blade 2x E5-2620v4 128GB 2x 1.2TB 10K 12Gb/s, H730, 57810-k pictureQENB (Intel Xeon E5-2660 v2) Ten Core Processor
$150.0
QENB (Intel Xeon E5-2660 v2) Ten Core Processor picture


Discussions

No Discussions have been posted on this vulnerability.