First published: Mon Jan 05 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) before 4.23 allow remote attackers to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sixapart Movable Type | =3.15 | |
Sixapart Movable Type | =3.2 | |
Sixapart Movable Type | =3.32 | |
Sixapart Movable Type | =3.16 | |
Sixapart Movable Type | =3.1 | |
Sixapart Movable Type | =3.33 | |
Sixapart Movable Type | =3.14 | |
Sixapart Movable Type | =3.0d | |
Sixapart Movable Type | =3.11 | |
Sixapart Movable Type | =3.35 | |
Sixapart Movable Type | <=4.21 | |
Sixapart Movable Type | =4.2 | |
Sixapart Movable Type | =3.17 | |
Sixapart Movable Type | =3.01d | |
Sixapart Movable Type | =3.12 | |
Sixapart Movable Type | =3.3 | |
Sixapart Movable Type | =3.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.