CVE-2016-5742

SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sixapart:movable_type:6.0:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.1:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.1:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.2:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.2:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.3:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.3:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.4:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.4:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.5:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.5:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.6:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.6:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.7:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.7:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.8:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.0.8:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.1.0:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.1.0:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.1.1:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.1.1:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.1.2:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.1.2:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.2.0:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.2.0:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.2.2:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.2.2:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type:6.2.4:*:*:*:advanced:*:*:*
cpe:2.3:a:sixapart:movable_type:6.2.4:*:*:*:pro:*:*:*
cpe:2.3:a:sixapart:movable_type_open_source:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/06/22/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/06/22/3 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/06/22/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/06/22/5 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/06/22/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/06/22/6 - Mailing List, Third Party Advisory
References () http://www.securitytracker.com/id/1036160 - () http://www.securitytracker.com/id/1036160 -
References () https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html - Release Notes, Vendor Advisory () https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html - Release Notes, Vendor Advisory

Information

Published : 2017-01-23 21:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5742

Mitre link : CVE-2016-5742

CVE.ORG link : CVE-2016-5742


JSON object : View

Products Affected

sixapart

  • movable_type
  • movable_type_open_source
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')