First published: Mon Jun 17 2013(Updated: )
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/movabletype-opensource | ||
debian/movabletype-opensource | <=5.1.4+dfsg-4<=5.1.4+dfsg-5 | 5.1.4+dfsg-4+deb7u2 |
Six Apart Movable Type | <=5.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2184 is considered to have a high severity due to its potential for remote code execution.
To fix CVE-2013-2184, upgrade Movable Type to version 5.2.6 or later.
CVE-2013-2184 affects Movable Type versions prior to 5.2.6.
Yes, CVE-2013-2184 can be exploited by remote attackers to execute arbitrary code.
CVE-2013-2184 primarily involves the improper use of the Storable::thaw function in the Movable Type application.