Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-45746: Movable Type vulnerable to cross-site scripting

Cross-site scripting vulnerability in Movable Type series allows a remote authenticated attacker to inject an arbitrary script. Affected products/versions are as follows: Movable Type 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Premium 1.58 and earlier, Movable Type Premium Advanced 1.58 and earlier, Movable Type Cloud Edition (Version 7) r.5405 and earlier, and Movable Type Premium Cloud Edition 1.58 and earlier.

CVE
#xss#vulnerability#web#auth

Published:2023/10/25 Last Updated:2023/10/25

Overview

Movable Type provided by Six Apart Ltd. contains a cross-site scripting vulnerability.

Products Affected

  • Movable Type 7 r.5405 and earlier (Movable Type 7 Series)
  • Movable Type Advanced 7 r.5405 and earlier (Movable Type 7 Series)
  • Movable Type Premium 1.58 and earlier
  • Movable Type Premium Advanced 1.58 and earlier
  • Movable Type Cloud Edition (Version 7) r.5405 and earlier
  • Movable Type Premium Cloud Edition 1.58 and earlier

Description

Movable Type provided by Six Apart Ltd. contains a cross-site scripting vulnerability (CWE-79).

Impact

An arbitrary script may be executed on a logged-in user’s web browser.

Solution

Update the Software
Apply the appropriate update according to the information provided by the developer.
The developer has released the following updates that contain fix for this vulnerability:

  • Movable Type 7 r.5501 (Movable Type 7 Series)
  • Movable Type Advanced 7 r.5501 (Movable Type 7 Series)
  • Movable Type Premium 1.59
  • Movable Type Premium Advanced 1.59
  • Movable Type Cloud Edition (Version 7) r.5501
  • Movable Type Premium Cloud Edition 1.59

For more information, refer to the information provided by the developer.

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Attack Vector(AV)

Physical §

Local (L)

Adjacent (A)

Network (N)

Attack Complexity(AC)

High (H)

Low (L)

Privileges Required(PR)

High (H)

Low (L)

None (N)

User Interaction(UI)

Required ®

None (N)

Scope(S)

Unchanged (U)

Changed ©

Confidentiality Impact©

None (N)

Low (L)

High (H)

Integrity Impact(I)

None (N)

Low (L)

High (H)

Availability Impact(A)

None (N)

Low (L)

High (H)

CVSS v2 AV:N/AC:M/Au:S/C:N/I:P/A:N

Access Vector(AV)

Local (L)

Adjacent Network (A)

Network (N)

Access Complexity(AC)

High (H)

Medium (M)

Low (L)

Authentication(Au)

Multiple (M)

Single (S)

None (N)

Confidentiality Impact©

None (N)

Partial §

Complete ©

Integrity Impact(I)

None (N)

Partial §

Complete ©

Availability Impact(A)

None (N)

Partial §

Complete ©

Credit

Six Apart Ltd. reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN. JPCERT/CC and Six Apart Ltd. coordinated under the Information Security Early Warning Partnership.

Other Information

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907