|
|||
Rule General Information |
---|
Release Date: | 2024-04-23 | |
Rule Name: | Six Apart Movable Type Command Injection Vulnerability (CVE-2021-20837) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | ExploitDB:50464 https://jvn.jp/en/jp/JVN41119755/index.html https://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html https://movabletype.org/news/2021/10/mt-782-683-released.html |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: http://jvn.jp/en/jp/JVN41119755/index.html |