Vulnerability Description
The default configuration of Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 supports the "mt:Include file=" attribute, which allows remote authenticated users to conduct directory traversal attacks and read arbitrary files by leveraging the template-designer role.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Movabletype | Movable Type Open Source | <= 4.37 |
| Movabletype | Movable Type Enterprise | <= 4.37 |
| Movabletype | Movable Type Advanced | <= 4.37 |
| Movabletype | Movable Type Pro | <= 4.37 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2012/dsa-2423
- http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updatesPatchVendor Advisory
- http://www.movabletype.org/documentation/appendices/release-notes/513.htmlPatchVendor Advisory
- http://www.debian.org/security/2012/dsa-2423
- http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updatesPatchVendor Advisory
- http://www.movabletype.org/documentation/appendices/release-notes/513.htmlPatchVendor Advisory
FAQ
What is CVE-2012-1497?
CVE-2012-1497 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The default configuration of Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 supports the "mt:Include file=" attribute, which allows remote authenticated users to conduct directory tr...
How severe is CVE-2012-1497?
CVE-2012-1497 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1497?
Check the references section above for vendor advisories and patch information. Affected products include: Movabletype Movable Type Open Source, Movabletype Movable Type Enterprise, Movabletype Movable Type Advanced, Movabletype Movable Type Pro.