The default configuration of Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 supports the "mt:Include file=" attribute, which allows remote authenticated users to conduct directory traversal attacks and read arbitrary files by leveraging the template-designer role.
References
Link | Resource |
---|---|
http://www.debian.org/security/2012/dsa-2423 | |
http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html | Patch Vendor Advisory |
http://www.movabletype.org/documentation/appendices/release-notes/513.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2012-03-03 04:04
Updated : 2024-02-04 17:54
NVD link : CVE-2012-1497
Mitre link : CVE-2012-1497
CVE.ORG link : CVE-2012-1497
JSON object : View
Products Affected
movabletype
- movable_type_pro
- movable_type_enterprise
- movable_type_open_source
- movable_type_advanced
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')