Package: movabletype-opensource
Version: 5.1.2+dfsg-3
Severity: grave
Justification: security

http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html

"5.13, 5.07, and 4.38 address the multiple vulnerabilities including:

- OS Command Injection exists in the file management system, the most
  serious of which may lead to arbitrary OS command execution by a user
  who has a permission to sign-in to the admin script and also has a
  permission to upload files.
- Session Hijack and CSRF exist in the commenting and the community
  script. A remote attacker could hijack the user session or could
  execute arbitrary script code on victim's browser under the certain
  circumstances.
- XSS exists in templates where the variables are not escaped properly.
  A remote attacker could inject client-side script into web pages
  viewed by other users.
- XSS exists in mt-wizard.cgi. This vulnerability was reported by
  Trustwave (TWSL2012-003)
"

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to