First published: Sat Mar 03 2012(Updated: )
The default configuration of Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 supports the "mt:Include file=" attribute, which allows remote authenticated users to conduct directory traversal attacks and read arbitrary files by leveraging the template-designer role.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Movable Type Open Source | <=4.37 | |
Movable Type Open Source | =4.0 | |
Movable Type Open Source | =4.0-beta | |
Movable Type Open Source | =4.1 | |
Movable Type Open Source | =4.1-beta | |
Movable Type Open Source | =4.01-beta | |
Movable Type Open Source | =4.2 | |
Movable Type Open Source | =4.2-beta | |
Movable Type Open Source | =4.3 | |
Movable Type Open Source | =4.23 | |
Movable Type Open Source | =4.25 | |
Movable Type Open Source | =4.26 | |
Movable Type Open Source | =4.31 | |
Movable Type Open Source | =4.32 | |
Movable Type Open Source | =4.33 | |
Movable Type Open Source | =4.34 | |
Movable Type Open Source | =4.35 | |
Movable Type Open Source | =4.36 | |
Movable Type Open Source | =4.261 | |
Movable Type Open Source | =4.361 | |
Movable Type Open Source | =5.1 | |
Movable Type Open Source | =5.02 | |
Movable Type Open Source | =5.03 | |
Movable Type Open Source | =5.04 | |
Movable Type Open Source | =5.05 | |
Movable Type Open Source | =5.06 | |
Movable Type Open Source | =5.11 | |
Movable Type Open Source | =5.12 | |
Movable Type Open Source | =5.031 | |
Movable Type Open Source | =5.051 | |
Movable Type | <=4.37 | |
Movable Type | =4.0 | |
Movable Type | =4.0-beta | |
Movable Type | =4.1 | |
Movable Type | =4.01-beta | |
Movable Type | =4.1-beta | |
Movable Type | =4.2 | |
Movable Type | =4.2-beta | |
Movable Type | =4.3 | |
Movable Type | =4.23 | |
Movable Type | =4.25 | |
Movable Type | =4.26 | |
Movable Type | =4.31 | |
Movable Type | =4.32 | |
Movable Type | =4.33 | |
Movable Type | =4.34 | |
Movable Type | =4.35 | |
Movable Type | =4.36 | |
Movable Type | =4.261 | |
Movable Type | =4.361 | |
Movable Type | =5.1 | |
Movable Type | =5.02 | |
Movable Type | =5.03 | |
Movable Type | =5.04 | |
Movable Type | =5.05 | |
Movable Type | =5.06 | |
Movable Type | =5.11 | |
Movable Type | =5.12 | |
Movable Type | =5.031 | |
Movable Type | =5.051 | |
Movable Type | <=4.37 | |
Movable Type | =4.0 | |
Movable Type | =4.0-beta | |
Movable Type | =4.1 | |
Movable Type | =4.01-beta | |
Movable Type | =4.1-beta | |
Movable Type | =4.2 | |
Movable Type | =4.2-beta | |
Movable Type | =4.3 | |
Movable Type | =4.23 | |
Movable Type | =4.25 | |
Movable Type | =4.26 | |
Movable Type | =4.31 | |
Movable Type | =4.32 | |
Movable Type | =4.33 | |
Movable Type | =4.34 | |
Movable Type | =4.35 | |
Movable Type | =4.36 | |
Movable Type | =4.261 | |
Movable Type | =4.361 | |
Movable Type | =5.1 | |
Movable Type | =5.02 | |
Movable Type | =5.03 | |
Movable Type | =5.04 | |
Movable Type | =5.05 | |
Movable Type | =5.06 | |
Movable Type | =5.11 | |
Movable Type | =5.12 | |
Movable Type | =5.031 | |
Movable Type | =5.051 | |
Movable Type | <=4.37 | |
Movable Type | =4.0 | |
Movable Type | =4.0-beta | |
Movable Type | =4.1 | |
Movable Type | =4.1-beta | |
Movable Type | =4.01-beta | |
Movable Type | =4.2 | |
Movable Type | =4.2-beta | |
Movable Type | =4.3 | |
Movable Type | =4.23 | |
Movable Type | =4.25 | |
Movable Type | =4.26 | |
Movable Type | =4.31 | |
Movable Type | =4.32 | |
Movable Type | =4.33 | |
Movable Type | =4.34 | |
Movable Type | =4.35 | |
Movable Type | =4.36 | |
Movable Type | =4.261 | |
Movable Type | =4.361 | |
Movable Type | =5.1 | |
Movable Type | =5.02 | |
Movable Type | =5.03 | |
Movable Type | =5.04 | |
Movable Type | =5.05 | |
Movable Type | =5.06 | |
Movable Type | =5.11 | |
Movable Type | =5.12 | |
Movable Type | =5.031 | |
Movable Type | =5.051 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1497 has a medium severity rating due to its potential for directory traversal attacks allowing unauthorized access to files.
To fix CVE-2012-1497, upgrade Movable Type to version 4.38, 5.07, or 5.13 or later.
CVE-2012-1497 affects Movable Type versions prior to 4.38, 5.0x before 5.07, and 5.1x before 5.13.
The attack vector for CVE-2012-1497 involves remote authenticated users exploiting the "mt:Include file=" attribute for directory traversal.
Yes, CVE-2012-1497 can lead to unauthorized file access and potentially expose sensitive data.