Vulnerability Details : CVE-2012-0319
The file-management system in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allows remote authenticated users to execute arbitrary commands by leveraging the file-upload feature, related to an "OS Command Injection" issue.
Products affected by CVE-2012-0319
- cpe:2.3:a:movabletype:movable_type_open_source:*:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.051:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.05:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.36:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.35:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.26:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.25:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.01:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.0:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.04:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.34:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.33:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.23:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.06:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.361:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.261:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.2:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.1:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.031:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.32:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.31:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_open_source:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:*:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.04:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.31:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.2:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.1:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.031:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.33:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.32:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.05:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.35:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.34:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.25:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.23:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.06:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:5.051:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.361:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.36:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.261:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.26:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.01:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_enterprise:4.0:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:*:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.06:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.051:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.361:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.36:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.26:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.25:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.01:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.0:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.261:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.2:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.1:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.04:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.031:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.33:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.32:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.31:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.05:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.35:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.34:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.23:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_advanced:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:*:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.05:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.34:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.33:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.23:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.06:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.051:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.36:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.35:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.26:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.25:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.01:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.0:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.361:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.261:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.2:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.1:beta:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.04:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:5.031:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.32:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.31:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:movabletype:movable_type_pro:4.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-0319
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-0319
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2012-0319
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0319
-
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000017
JVNDB-2012-000017 - JVN iPedia - 脆弱性対策情報データベース
-
http://www.movabletype.org/documentation/appendices/release-notes/513.html
MovableType.org – Documentation: Movable Type 5.13, 5.07, and 4.38 Release NotesPatch;Vendor Advisory
-
http://www.securitytracker.com/id?1026738
Movable Type Flaws Permit Remote Authenticated Command Injection and Remote Cross-Site Scripting and Cross-Site Request Forgery Attacks - SecurityTracker
-
http://jvn.jp/en/jp/JVN92683325/index.html
JVN#92683325: Movable Type vulnerable to OS command injection
-
http://www.securityfocus.com/bid/52138
Movable Type Multiple Remote Vulnerabilities
-
http://www.debian.org/security/2012/dsa-2423
Debian -- Security Information -- DSA-2423-1 movabletype-opensource
-
http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html
MovableType.org – News: Movable Type 5.13, 5.07, and 4.38 Security UpdatesPatch;Vendor Advisory
Jump to