SB2015021905 - Improper Neutralization of Special Elements in Output Used by a Downstream Component in Movable Type
Published: February 19, 2015 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper Neutralization of Special Elements in Output Used by a Downstream Component (CVE-ID: CVE-2015-1592)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2015/02/12/17
- http://www.openwall.com/lists/oss-security/2015/02/12/2
- http://www.securityfocus.com/bid/72606
- http://www.securitytracker.com/id/1031777
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100912
- https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html
- https://www.debian.org/security/2015/dsa-3183