movable type 6.0.1, 5.2.9, and 5.161 XSS

2014-01-06 / 2014-01-08
Credit: Salvatore
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

A movable type update to 6.0.1, 5.29 and 5.161 fixes cross-site scripting attacks, from the announcement: The Rich Text Editor in previous versions of Movable Type 6 and Movable Type 5 are susceptible to cross-site scripting (XSS) attacks. A remote attacker can inject JavaScript into a page or entry in a Movable Type blog or website. This JavaScript can be executed on the client browser when that page or entry is subsequently displayed in the Rich Text Editor. These vulnerabilities were reported by a member of the Movable Type community, and were kept confidential until the release of the updated versions of Movable Type. [0] http://movabletype.org/news/2013/11/movable_type_601_529_and_5161_released_to_close_security_vul.html Looking trough the git repository at [1], there is at least [2] which seems to indicate the fix for the 5.2.x branch (I cannot say tough if this the complete one). [1] https://github.com/movabletype/movabletype [2] https://github.com/movabletype/movabletype/commit/c85903b3ee23ea2b4ddf981a75815c737f6f6040 Debian Bugtracker reference is at [3]. [3] http://bugs.debian.org/734304 Is there enough information to identify the vulnerability and to get a CVE assigned for this issue? Regards, Salvatore

Referencje:

https://github.com/movabletype/movabletype
https://github.com/movabletype/movabletype/commit/c85903b3ee23ea2b4ddf981a75815c737f6f6040
http://seclists.org/oss-sec/2014/q1/24


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top