Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN37014768/index.html | Third Party Advisory |
https://movabletype.org/news/2022/11/mt-796-688-released.html | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2022-12-07T00:00:00
Updated: 2022-12-07T00:00:00
Reserved: 2022-11-15T00:00:00
Link: CVE-2022-45113
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-07T04:15:11.233
Modified: 2022-12-12T15:15:58.013
Link: CVE-2022-45113
JSON object: View
Redhat Information
No data.
CWE