Published:2008/03/07  Last Updated:2008/05/21

JVN#21312708
MTCMS WYSIWYG Editor cross-site scripting vulnerability

Overview

MTCMS WYSIWYG Editor, weblog management software from SKYARC System, contains a cross-site scripting vulnerability.

Products Affected

  • All versions of MTCMS WYSIWYG Editor

Description

MTCMS WYSIWYG Editor from SKYARC System is management software used to update Movable Type contents, etc. The install.cgi in MTCMS WYSIWYG Editor contains a cross-site scripting vulnerability.

Impact

An arbitrary script could be executed on the user's web browser.

Solution

Workarounds
The vendor provides a workaround for this issue. For more information, refer to the vendor's website.

Vendor Status

Vendor Status Last Update Vendor Notes
SKYARC System Co., Ltd, Vulnerable 2008/03/07

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2008.03.07

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures

Credit

Taketo Ikeuchi reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2008-000003

Update History