{ "document": { "aggregate_severity": { "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-MT-2016-5742 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2017/cpansa-mt-2016-5742.json" }, { "category": "external", "summary": "https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html", "url": "https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2016/06/22/6", "url": "http://www.openwall.com/lists/oss-security/2016/06/22/6" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2016/06/22/5", "url": "http://www.openwall.com/lists/oss-security/2016/06/22/5" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2016/06/22/3", "url": "http://www.openwall.com/lists/oss-security/2016/06/22/3" }, { "category": "external", "summary": "http://www.securitytracker.com/id/1036160", "url": "http://www.securitytracker.com/id/1036160" }, { "category": "external", "summary": "CVE-2016-5742 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5742" } ], "title": "MT vulnerability", "tracking": { "current_release_date": "2017-01-23T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-MT-2016-5742", "initial_release_date": "2017-01-23T00:00:00", "revision_history": [ { "date": "2017-01-23T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/>=6.0.0|<6.1.3", "product": { "name": "MT greater than or equal 6.0.0 and less than 6.1.3", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:cpan/>=6.2.0|<6.2.6", "product": { "name": "MT greater than or equal 6.2.0 and less than 6.2.6", "product_id": "CSAFPID-0002" } }, { "category": "product_version_range", "name": "vers:cpan/<5.2.13", "product": { "name": "MT less than 5.2.13", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "MT" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5742", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" }, "notes": [ { "category": "description", "text": "SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.", "title": "Vulnerability Description" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "scores": [ { "cvss_v2": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }