CVE-2020-5576
Summary
| CVE | CVE-2020-5576 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-14 02:15:00 UTC |
| Updated | 2020-05-15 17:33:00 UTC |
| Description | Cross-site request forgery (CSRF) vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to hijack the authentication of administrators via unspecified vectors. |
Risk And Classification
Problem Types: CWE-352
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
| Application | Sixapart | Movable Type | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| JVN#28806943: Multiple vulnerabilities in Movable Type | MISC | jvn.jp | Third Party Advisory, VDB Entry |
| MovableType.org – News: Movable Type r.4607 (v7.3.0), v6.6.0 and v6.3.12 released. | MISC | movabletype.org | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.