movable type 6.0.1, 5.2.9, and 5.161 XSS

2014-01-06 / 2014-01-08
Credit: Salvatore
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

A movable type update to 6.0.1, 5.29 and 5.161 fixes cross-site scripting attacks, from the announcement: The Rich Text Editor in previous versions of Movable Type 6 and Movable Type 5 are susceptible to cross-site scripting (XSS) attacks. A remote attacker can inject JavaScript into a page or entry in a Movable Type blog or website. This JavaScript can be executed on the client browser when that page or entry is subsequently displayed in the Rich Text Editor. These vulnerabilities were reported by a member of the Movable Type community, and were kept confidential until the release of the updated versions of Movable Type. [0] http://movabletype.org/news/2013/11/movable_type_601_529_and_5161_released_to_close_security_vul.html Looking trough the git repository at [1], there is at least [2] which seems to indicate the fix for the 5.2.x branch (I cannot say tough if this the complete one). [1] https://github.com/movabletype/movabletype [2] https://github.com/movabletype/movabletype/commit/c85903b3ee23ea2b4ddf981a75815c737f6f6040 Debian Bugtracker reference is at [3]. [3] http://bugs.debian.org/734304 Is there enough information to identify the vulnerability and to get a CVE assigned for this issue? Regards, Salvatore

References:

https://github.com/movabletype/movabletype
https://github.com/movabletype/movabletype/commit/c85903b3ee23ea2b4ddf981a75815c737f6f6040
http://seclists.org/oss-sec/2014/q1/24


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top