Debian DSA-2611-1 : movabletype-opensource - several vulnerabilities

high Nessus Plugin ID 63648

Synopsis

The remote Debian host is missing a security-related update.

Description

An input sanitation problem has been found in upgrade functions of movabletype-opensource, a web-based publishing platform. Using carefully crafted requests to the mt-upgrade.cgi file, it would be possible to inject OS command and SQL queries.

Solution

Upgrade the movabletype-opensource packages.

For the stable distribution (squeeze), this problem has been fixed in version 4.3.8+dfsg-0+squeeze3.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697666

https://packages.debian.org/source/squeeze/movabletype-opensource

https://www.debian.org/security/2013/dsa-2611

Plugin Details

Severity: High

ID: 63648

File Name: debian_DSA-2611.nasl

Version: 1.9

Type: local

Agent: unix

Published: 1/23/2013

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:movabletype-opensource, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/22/2013

Exploitable With

Metasploit (Movable Type 4.2x, 4.3x Web Upgrade Remote Code Execution)

Reference Information

CVE: CVE-2013-0209

DSA: 2611