First published: Thu Dec 09 2010(Updated: )
SQL injection vulnerability in Movable Type 4.x before 4.35 and 5.x before 5.04 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Six Apart Movable Type | =4.33 | |
Six Apart Movable Type | =4.34 | |
Six Apart Movable Type | =4.0 | |
Six Apart Movable Type | =4.1 | |
Six Apart Movable Type | =4.32 | |
Six Apart Movable Type | =4.2 | |
Six Apart Movable Type | =4.26 | |
Six Apart Movable Type | =4.23 | |
Six Apart Movable Type | =4.25 | |
Six Apart Movable Type | =5.02 | |
Six Apart Movable Type | =4.3 | |
Six Apart Movable Type | =4.31 | |
Six Apart Movable Type | =5.01 | |
Six Apart Movable Type | =5.031 | |
Six Apart Movable Type | =4.261 | |
Six Apart Movable Type | =5.0-rc2 | |
Six Apart Movable Type | =5.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3922 is classified as a high-severity SQL injection vulnerability.
To remediate CVE-2010-3922, upgrade Movable Type to version 4.35 or higher for 4.x or to version 5.04 or higher for 5.x.
CVE-2010-3922 affects Movable Type versions 4.x prior to 4.35 and 5.x prior to 5.04.
CVE-2010-3922 enables remote attackers to execute arbitrary SQL commands against vulnerable Movable Type instances.
There are no official workarounds for CVE-2010-3922 other than applying the necessary updates or patches.