Published:2011/10/31 Last Updated:2012/03/14
JVN#56667137
Multiple SKYARC System Co., Ltd. products vulnerable to cross-site request forgery
Overview
Multiple products provided by SKYARC System Co., Ltd. contain a cross-site request forgery vulnerability.
Products Affected
- MTCMS version 5.251 and earlier
- MTCMS Enterprise version 5.251 and earlier
- MTCMS Smart version 5.251 and earlier
The following pluigins for Movable Type below are also affected:
- MultiFileuploader version 0.44 and earlier
- MailPack version 1.741 and earlier
- EntryImExporter version 1.41 and earlier
- AutoTagging version 0.08 and earlier
- AuthorEffective version 1.03 and earlier
- DuplicateEntry version 1.2 and earlier
Description
MTCMS and multiple Movable Type plugins provided by SKYARC System Co., Ltd. contain a cross-site request forgery vulnerability.
Impact
If a user views a malicious page while logged into MTCMS or a Movable Type implementation with any of the plugins from "Products Affected" running, information managed by MTCMS or Movable Type may be altered.
Solution
Apply an update
Update to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Link |
SKYARC System Co., Ltd. | [Important] MTCMS 5.252 and security updates are released (Japanese only) |
Security updates for Movable Type plugins (Japanese only) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2011.10.31
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2011-3994 |
JVN iPedia |
JVNDB-2011-000094 |
Update History
- 2011/11/08
- Information under "Products Affected" and "Vendor Status" were updated.
- 2012/03/14
- The title was corrected.