DSA-2423-1 movabletype-opensource -- several vulnerabilities

Related Vulnerabilities: CVE-2012-1497   CVE-2012-1262   CVE-2012-0320   CVE-2012-0319   CVE-2012-0318   CVE-2012-0317   CVE-2011-5085   CVE-2011-5084  

Several vulnerabilities were discovered in Movable Type, a blogging system: Under certain circumstances, a user who has Create Entries or Manage Blog permissions may be able to read known files on the local file system. The file management system contains shell command injection vulnerabilities, the most serious of which may lead to arbitrary OS command execution by a user who has a permission to sign-in to the admin script and also has a permission to upload files. Session hijack and cross-site request forgery vulnerabilities exist in the commenting and the community script. A remote attacker could hijack the user session or could execute arbitrary script code on victim's browser under the certain circumstances. Templates which do not escape variable properly and mt-wizard.cgi contain cross-site scripting vulnerabilities. For the stable distribution (squeeze), these problems have been fixed in version 4.3.8+dfsg-0+squeeze2. For the testing distribution (wheezy) and the unstable distribution (sid), these problems have been fixed in version 5.1.3+dfsg-1. We recommend that you upgrade your movabletype-opensource packages.

Debian Security Advisory

DSA-2423-1 movabletype-opensource -- several vulnerabilities

Date Reported:
02 Mar 2012
Affected Packages:
movabletype-opensource
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 631437, Bug 661064.
In Mitre's CVE dictionary: CVE-2012-1497, CVE-2012-1262, CVE-2012-0320, CVE-2012-0319, CVE-2012-0318, CVE-2012-0317, CVE-2011-5085, CVE-2011-5084.
More information:

Several vulnerabilities were discovered in Movable Type, a blogging system:

Under certain circumstances, a user who has Create Entries or Manage Blog permissions may be able to read known files on the local file system.

The file management system contains shell command injection vulnerabilities, the most serious of which may lead to arbitrary OS command execution by a user who has a permission to sign-in to the admin script and also has a permission to upload files.

Session hijack and cross-site request forgery vulnerabilities exist in the commenting and the community script. A remote attacker could hijack the user session or could execute arbitrary script code on victim's browser under the certain circumstances.

Templates which do not escape variable properly and mt-wizard.cgi contain cross-site scripting vulnerabilities.

For the stable distribution (squeeze), these problems have been fixed in version 4.3.8+dfsg-0+squeeze2.

For the testing distribution (wheezy) and the unstable distribution (sid), these problems have been fixed in version 5.1.3+dfsg-1.

We recommend that you upgrade your movabletype-opensource packages.