oss-sec mailing list archives
Re: CVE request: SQL injection in MovableType xml-rpc interface
From: John Lightsey <john () nixnuts net>
Date: Wed, 22 Jun 2016 16:48:55 -0500
On Wed, 2016-06-22 at 17:34 -0400, cve-assign () mitre org wrote:
SixApart just released new versions of MovableType 6.2 and 6.1 to fix an SQL injection in the xml-rpc interface.https://movabletype.org/news/2016/06/movable_type_626_and_613_released.htmlThis says:Previous versions, including Movable Type 6.2.4 and 6.1.2, are susceptible to SQL injection attacks via XML-RPC interface.AFFECTED VERSIONS OF MOVABLE TYPEMovable Type Pro 6.0.x, 6.1.x, 6.2.x Movable Type Advanced 6.0.x, 6.1.x, 6.2.xUse CVE-2016-5742.The vulnerability also affects the older GPLv2 licensed MovableType 5.2.13.Is there a separate public reference stating that 5.2.13 is affected? Or, do you mean that you've done your own analysis and concluded that 5.2.13 has the same vulnerability as 6.x? (Either one seems fine, and wouldn't affect the number of CVE IDs - we are mostly interested in linking the CVE to the primary-source reference about the 5.2.13 vulnerability, if such a reference exists elsewhere.)
I sent the original vulnerability report to SixApart and based my report on the 5.2.13 version of the code.
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- CVE request: SQL injection in MovableType xml-rpc interface John Lightsey (Jun 22)
- Re: CVE request: SQL injection in MovableType xml-rpc interface cve-assign (Jun 22)
- Re: CVE request: SQL injection in MovableType xml-rpc interface John Lightsey (Jun 22)
- Re: CVE request: SQL injection in MovableType xml-rpc interface cve-assign (Jun 22)