Vulnerability Description
Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sixapart | Movable Type | <= 1.53 |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/jp/JVN37014768/index.htmlThird Party Advisory
- https://movabletype.org/news/2022/11/mt-796-688-released.htmlRelease NotesVendor Advisory
- https://jvn.jp/en/jp/JVN37014768/index.htmlThird Party Advisory
- https://movabletype.org/news/2022/11/mt-796-688-released.htmlRelease NotesVendor Advisory
FAQ
What is CVE-2022-45113?
CVE-2022-45113 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a s...
How severe is CVE-2022-45113?
CVE-2022-45113 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-45113?
Check the references section above for vendor advisories and patch information. Affected products include: Sixapart Movable Type.