First published: Tue Oct 26 2021(Updated: )
Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Sixapart Movable Type | <=1.46 | |
Sixapart Movable Type | <=1.46 | |
Sixapart Movable Type | >=4.0<=6.3.11 | |
Sixapart Movable Type | >=6.5.0<=6.8.2 | |
Sixapart Movable Type | >=6.5.0<=6.8.2 | |
Sixapart Movable Type | >=7.0<=7.8.1 | |
Sixapart Movable Type | >=7.0<=7.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20837.
The severity of CVE-2021-20837 is critical with a severity value of 9.8.
Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier are affected.
Apply the latest security patch provided by Sixapart Movable Type.
You can find more information about CVE-2021-20837 at the following references: [link1](http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html), [link2](http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html), [link3](https://jvn.jp/en/jp/JVN41119755/index.html).