SixApart.MovableType.Storable.Perl.Code.Injection
Description
This indicates an attack attempt against a Command Injection vulnerability in Movable Type.
The vulnerability is due to an input validation error while parsing a crafted HTTP request. A remote attacker could exploit this to execute arbitrary code within the context of the application, via a crafted HTTP.
Affected Products
Movable Type Pro 6.0.6 and prior
Movable Type Pro 5.2.11 and prior
Movable Type Open Source (MTOS) 5.2.11 and prior
Movable Type Advanced 6.0.6 and prior
Movable Type Advanced 5.2.11 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |