First published: Wed Jan 23 2013(Updated: )
lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sixapart Movable Type | =4.21 | |
Sixapart Movable Type | =4.22 | |
Sixapart Movable Type | =4.23 | |
Sixapart Movable Type | =4.24 | |
Sixapart Movable Type | =4.25 | |
Sixapart Movable Type | =4.26 | |
Sixapart Movable Type | =4.27 | |
Sixapart Movable Type | =4.28 | |
Sixapart Movable Type | =4.28 | |
Sixapart Movable Type | =4.28 | |
Sixapart Movable Type | =4.29 | |
Sixapart Movable Type | =4.29 | |
Sixapart Movable Type | =4.29 | |
Sixapart Movable Type | =4.31 | |
Sixapart Movable Type | =4.32 | |
Sixapart Movable Type | =4.33 | |
Sixapart Movable Type | =4.34 | |
Sixapart Movable Type | =4.35 | |
Sixapart Movable Type | =4.36 | |
Sixapart Movable Type | =4.37 | |
Sixapart Movable Type | =4.38 | |
Sixapart Movable Type | =4.261 | |
Sixapart Movable Type | =4.291 | |
Sixapart Movable Type | =4.291 | |
Sixapart Movable Type | =4.291 | |
Sixapart Movable Type | =4.292 | |
Sixapart Movable Type | =4.292 | |
Sixapart Movable Type | =4.292 | |
Sixapart Movable Type | =4.361 | |
Sixapart Movable Type | =4.36 | |
Sixapart Movable Type | =4.37 | |
Sixapart Movable Type | =4.38 | |
Sixapart Movable Type | =4.361 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.