Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN37014768/index.html | Third Party Advisory |
https://movabletype.org/news/2022/11/mt-796-688-released.html | Release Notes Vendor Advisory |
https://jvn.jp/en/jp/JVN37014768/index.html | Third Party Advisory |
https://movabletype.org/news/2022/11/mt-796-688-released.html | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/jp/JVN37014768/index.html - Third Party Advisory | |
References | () https://movabletype.org/news/2022/11/mt-796-688-released.html - Release Notes, Vendor Advisory |
Information
Published : 2022-12-07 04:15
Updated : 2024-11-21 07:28
NVD link : CVE-2022-45113
Mitre link : CVE-2022-45113
CVE.ORG link : CVE-2022-45113
JSON object : View
Products Affected
sixapart
- movable_type
CWE
CWE-20
Improper Input Validation