CVE-2015-1592

Published on: 02/19/2015 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:10 PM UTC

AV:N/AC:L/Au:N/C:P/I:P/A:P

Certain versions of Debian Linux from Debian contain the following vulnerability:

Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Debian -- Security Information -- DSA-3183-1 movabletype-opensource Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3183
Movable Type Include File Bug in Perl Storable Module Lets Remote Users Execute Local Scripts - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1031777
Movable Type CVE-2015-1592 Unspecified Local File Include Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 72606
MovableType.org – News: Movable Type 6.0.7 and 5.2.12 released to close security vulnerability Vendor Advisory
movabletype.org
text/html
URL Logo CONFIRM movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html
oss-security - Re: CVE request: MovableType before 5.2.12 - Movable Type Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20150212 Re: CVE request: MovableType before 5.2.12 - Movable Type
IBM X-Force Exchange Third Party Advisory
VDB Entry
exchange.xforce.ibmcloud.com
text/html
URL Logo XF movable-type-cve20151592-file-include(100912)
oss-security - CVE request: MovableType before 5.2.12 Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20150212 CVE request: MovableType before 5.2.12

Exploit/POC from Github

Metasploit modules and payload generation files from my Houston Perl Mongers talk about this vulnerability.

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux7.0AllAllAll
Operating
System
DebianDebian Linux7.0AllAllAll
ApplicationSixapartMovable TypeAllAllAllAll
ApplicationSixapartMovable TypeAllAllAllAll
ApplicationSixapartMovable TypeAllAllAllAll
ApplicationSixapartMovable TypeAllAllAllAll
ApplicationSixapartMovable TypeAllAllAllAll
ApplicationSixapartMovable TypeAllAllAllAll
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:sixapart:movable_type:*:*:*:*:advanced:*:*:*:
  • cpe:2.3:a:sixapart:movable_type:*:*:*:*:open_source:*:*:*:
  • cpe:2.3:a:sixapart:movable_type:*:*:*:*:pro:*:*:*:
  • cpe:2.3:a:sixapart:movable_type:*:*:*:*:advanced:*:*:*:
  • cpe:2.3:a:sixapart:movable_type:*:*:*:*:open_source:*:*:*:
  • cpe:2.3:a:sixapart:movable_type:*:*:*:*:pro:*:*:*:
© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report