First published: Mon Jan 23 2017(Updated: )
SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Six Apart Movable Type | =6.0 | |
Six Apart Movable Type | =6.0 | |
Six Apart Movable Type | =6.0.1 | |
Six Apart Movable Type | =6.0.1 | |
Six Apart Movable Type | =6.0.2 | |
Six Apart Movable Type | =6.0.2 | |
Six Apart Movable Type | =6.0.3 | |
Six Apart Movable Type | =6.0.3 | |
Six Apart Movable Type | =6.0.4 | |
Six Apart Movable Type | =6.0.4 | |
Six Apart Movable Type | =6.0.5 | |
Six Apart Movable Type | =6.0.5 | |
Six Apart Movable Type | =6.0.6 | |
Six Apart Movable Type | =6.0.6 | |
Six Apart Movable Type | =6.0.7 | |
Six Apart Movable Type | =6.0.7 | |
Six Apart Movable Type | =6.0.8 | |
Six Apart Movable Type | =6.0.8 | |
Six Apart Movable Type | =6.1.0 | |
Six Apart Movable Type | =6.1.0 | |
Six Apart Movable Type | =6.1.1 | |
Six Apart Movable Type | =6.1.1 | |
Six Apart Movable Type | =6.1.2 | |
Six Apart Movable Type | =6.1.2 | |
Six Apart Movable Type | =6.2.0 | |
Six Apart Movable Type | =6.2.0 | |
Six Apart Movable Type | =6.2.2 | |
Six Apart Movable Type | =6.2.2 | |
Six Apart Movable Type | =6.2.4 | |
Six Apart Movable Type | =6.2.4 | |
Movable Type Open Source | <=5.2.13 | |
=6.0 | ||
=6.0 | ||
=6.0.1 | ||
=6.0.1 | ||
=6.0.2 | ||
=6.0.2 | ||
=6.0.3 | ||
=6.0.3 | ||
=6.0.4 | ||
=6.0.4 | ||
=6.0.5 | ||
=6.0.5 | ||
=6.0.6 | ||
=6.0.6 | ||
=6.0.7 | ||
=6.0.7 | ||
=6.0.8 | ||
=6.0.8 | ||
=6.1.0 | ||
=6.1.0 | ||
=6.1.1 | ||
=6.1.1 | ||
=6.1.2 | ||
=6.1.2 | ||
=6.2.0 | ||
=6.2.0 | ||
=6.2.2 | ||
=6.2.2 | ||
=6.2.4 | ||
=6.2.4 | ||
<=5.2.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5742 is classified as a high severity SQL injection vulnerability.
To fix CVE-2016-5742, update Movable Type to version 6.1.3 or later, or to version 6.2.6 or later.
CVE-2016-5742 affects Movable Type Pro and Advanced versions prior to 6.1.3 and 6.2.x prior to 6.2.6, along with Movable Type Open Source versions 5.2.13 and earlier.
Yes, CVE-2016-5742 allows remote attackers to execute arbitrary SQL commands through the XML-RPC interface.
CVE-2016-5742 is a SQL injection vulnerability present in the XML-RPC interface of Movable Type.