{ "id": "CVE-2015-0845", "sourceIdentifier": "security@debian.org", "published": "2015-04-17T17:59:00.063", "lastModified": "2024-11-21T02:23:50.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in Movable Type Pro, Open Source, and Advanced before 5.2.13 and Pro and Advanced 6.0.x before 6.0.8 allows remote attackers to execute arbitrary code via vectors related to localization of templates." }, { "lang": "es", "value": "Vulnerabilidad de la cadena de formatos en Movable Type Pro, Open Source, y Advanced anterior a 5.2.13 y Pro y Advanced 6.0.x anterior a 6.0.8 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores relacionados con la localizaci\u00f3n de plantillas." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-94" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:*:*:*:*:advanced:*:*:*", "versionEndIncluding": "5.2.11", "matchCriteriaId": "650AB0AA-3A68-42EB-95C4-5C5767180F15" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:*:*:*:*:open_source:*:*:*", "versionEndIncluding": "5.2.11", "matchCriteriaId": "120D348E-5BB5-4732-B116-5AC51F20AF45" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:*:*:*:*:pro:*:*:*", "versionEndIncluding": "5.2.11", "matchCriteriaId": "80B1EC51-5182-47D0-808B-2DE38E154415" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0:*:*:*:advanced:*:*:*", "matchCriteriaId": "5095B62C-CB67-4140-BD67-A4C183C1C0CF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0:*:*:*:pro:*:*:*", "matchCriteriaId": "D02780C8-2E3F-4EB6-9604-E58866D6D0B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.1:*:*:*:advanced:*:*:*", "matchCriteriaId": "C6CC121A-8348-4103-9362-50F4D405AC80" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.1:*:*:*:pro:*:*:*", "matchCriteriaId": "F3A6D425-E594-4438-9AA5-4A668AF79185" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.2:*:*:*:advanced:*:*:*", "matchCriteriaId": "BEC00F7D-A2EB-442A-B2BC-DCB9FA6C0E83" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.2:*:*:*:pro:*:*:*", "matchCriteriaId": "6C49F552-1637-4629-AD48-CCA550C63D0C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.3:*:*:*:advanced:*:*:*", "matchCriteriaId": "8D05E393-A0EA-4F3F-8884-0357E24A78DD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.3:*:*:*:pro:*:*:*", "matchCriteriaId": "7183FB6E-B8A9-4B58-8FDD-711DB2D0DD5F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.4:*:*:*:advanced:*:*:*", "matchCriteriaId": "D0C28FC2-E150-447A-B001-AEC752103CB5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.4:*:*:*:pro:*:*:*", "matchCriteriaId": "466C0B21-A53C-4F1F-8D55-4D7C1A307372" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.5:*:*:*:advanced:*:*:*", "matchCriteriaId": "3F98F968-19A1-40E1-82C3-402C017754BC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.5:*:*:*:pro:*:*:*", "matchCriteriaId": "9D09F01C-D948-4DC7-A422-440A597B58B1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.6:*:*:*:advanced:*:*:*", "matchCriteriaId": "2B3A5FC0-6AAD-4F26-AA1F-8508507299AD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.6:*:*:*:pro:*:*:*", "matchCriteriaId": "D716D0A8-94C3-4693-A918-87C8ACEDEC77" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.7:*:*:*:advanced:*:*:*", "matchCriteriaId": "13249FBB-C85D-4188-A368-AF2B23C48C5D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sixapart:movabletype:6.0.7:*:*:*:pro:*:*:*", "matchCriteriaId": "FF25FFCC-C50F-442F-BBC0-1CD10DC0A76B" } ] } ] } ], "references": [ { "url": "http://www.debian.org/security/2015/dsa-3227", "source": "security@debian.org" }, { "url": "http://www.securitytracker.com/id/1032153", "source": "security@debian.org" }, { "url": "https://movabletype.org/news/2015/04/movable_type_608_and_5213_released_to_close_security_vulnera.html", "source": "security@debian.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.debian.org/security/2015/dsa-3227", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securitytracker.com/id/1032153", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://movabletype.org/news/2015/04/movable_type_608_and_5213_released_to_close_security_vulnera.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }