[Japanese]
|
JVNDB-2009-000043
|
Movable Type access restriction bypass vulnerability
|
Movable Type contains an access restriction bypass vulnerability.
Movable Type, a web log system from Six Apart KK, contains a vulnerability that allows a remote attacker to bypass access restrictions.
A successful attack requires mt-wizard.cgi not to be deleted after initial setup. For more information, refer to the developer's website.
Masashi Shiraishi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V2 Severity: Base Metrics 5.0 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
|
|
Six Apart, Ltd.
- Movable Type 4.25 (includes Professional and Community Packs) and earlier
- Movable Type (commercial) 4.25 (includes Professional Pack) and earlier
- Movable Type (enterprise) 4.25 and earlier
- Movable Type 4.25 (Open Source) and earlier
|
|
A remote attacker may send unsolicited email to arbitrary addresses or view information stored in Movable Type.
|
[Update the Software]
Update to the latest version according to the information provided by the developer.
|
Six Apart, Ltd.
|
- Permissions(CWE-264) [IPA Evaluation]
|
- CVE-2009-2481
|
- JVN : JVN#08369659
- National Vulnerability Database (NVD) : CVE-2009-2481
- Secunia Advisory : SA35534
- SecurityFocus : 35471
- ISS X-Force Database : 51330
- VUPEN Security : VUPEN/ADV-2009-1668
|
- [2009/07/01]
Web page published
|