{ "document": { "aggregate_severity": { "text": "medium" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5), Movable Type Premium 1.26 and earlier (Movable Type Premium), and Movable Type Premium Advanced 1.26 and earlier (Movable Type Premium Advanced)) allows remote attackers to inject arbitrary web script or HTML in the block editor and the rich text editor via a specially crafted URL.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-MT-2020-5528 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2020/cpansa-mt-2020-5528.json" }, { "category": "external", "summary": "https://movabletype.org/news/2020/02/movable_type_r4605_v720_v653_and_v6311_released.html", "url": "https://movabletype.org/news/2020/02/movable_type_r4605_v720_v653_and_v6311_released.html" }, { "category": "external", "summary": "http://jvn.jp/en/jp/JVN94435544/index.html", "url": "http://jvn.jp/en/jp/JVN94435544/index.html" }, { "category": "external", "summary": "CVE-2020-5528 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5528" } ], "title": "MT vulnerability", "tracking": { "current_release_date": "2020-02-06T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-MT-2020-5528", "initial_release_date": "2020-02-06T00:00:00", "revision_history": [ { "date": "2020-02-06T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/>=7|<7.1.4", "product": { "name": "MT greater than or equal 7 and less than 7.1.4", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:cpan/>=6|<=6.5.2", "product": { "name": "MT greater than or equal 6 and less than or equal 6.5.2", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "MT" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-5528", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" }, "notes": [ { "category": "description", "text": "Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5), Movable Type Premium 1.26 and earlier (Movable Type Premium), and Movable Type Premium Advanced 1.26 and earlier (Movable Type Premium Advanced)) allows remote attackers to inject arbitrary web script or HTML in the block editor and the rich text editor via a specially crafted URL.", "title": "Vulnerability Description" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "scores": [ { "cvss_v2": { "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }