vendor:
Movable Type
by:
Etienne Gervais, Charl-Alexandre Le Brun
9.8
CVSS
CRITICAL
Remote Command Injection
78
CWE
Product Name: Movable Type
Affected Version From:
Affected Version To:
Patch Exists: YES
Related CWE: CVE-2021-20837
CPE:
Tags: packetstorm,cve,cve2021,rce,movable
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://nemesis.sh/posts/movable-type-0day/, https://github.com/ghost-nemesis/cve-2021-20837-poc, https://twitter.com/cyber_advising/status/1454051725904580608, https://nvd.nist.gov/vuln/detail/CVE-2021-20837, http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html
Nuclei Metadata: {'max-request': 1, 'vendor': 'sixapart', 'product': 'movable_type'}
Platforms Tested: Linux
2021
Movable Type XMLRPC API Remote Command Injection
This module exploit Movable Type XMLRPC API Remote Command Injection. It sends a POST request to the mt-xmlrpc.cgi endpoint with a base64 encoded command. If the response code is 200 and the response body includes the fingerprint, then the vulnerability is exploited.
Mitigation:
Ensure that the application is not vulnerable to command injection attacks by validating user input and using parameterized queries.