JVN#65280626
Movable Type vulnerable to open redirect
Overview
Movable Type contains an open redirect vulnerability.
Products Affected
- Movable Type 7 r.4602 (7.1.3) and earlier (Movable Type 7)
- Movable Type 6.5.0 and 6.5.1 (Movable Type 6.5)
- Movable Type 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x)
- Movable Type Advanced 7 r.4602 (7.1.3) and earlier (Movable Type 7)
- Movable Type Advanced 6.5.0 and 6.5.1 (Movable Type 6.5)
- Movable Type Advanced 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x)
- Movable Type Premium 1.24 and earlier (Movable Type Premium)
- Movable Type Premium (Advanced Edition) 1.24 and earlier (Movable Type Premium)
Description
Movable Type provided by Six Apart Ltd. contains an open redirect vulnerability (CWE-601).
Impact
When accessing a specially crafted URL, the user may be redirected to an arbitrary website. As a result, the user may become a victim of a phishing attack.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
The developer states that the support for Movable Type 5.x and earlier versions has been ended, thus verification on impacts which may be caused by this vulnerability is not conducted and any countermeasures for this vulnerability are not provided. Therefore the developer recommends users to upgrade the software to the supported versions, such as Movable Type 6.5 or 7.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Six Apart Ltd. | Vulnerable | 2019/11/13 | Six Apart Ltd. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Hidetomo Hosono of EG Secure Solutions Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2019-6025 |
JVN iPedia |
JVNDB-2019-000069 |