Family: CGI abuses --> Category: attack
Movable Type < 3.2 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary
Checks for multiple vulnerabilities in Movable Type < 3.2
Detailed Explanation for this Vulnerability Test
The remote web server contains CGI scripts that are prone to arbitrary
remote command execution, information disclosure, and cross-site
The remote host is running Movable Type, a blog software written in
The installed version of Movable Type allows a possible hacker to enumerate
valid usernames because its password reset functionality returns
different errors depending on whether the supplied username exists
allows privileged users to upload files with arbitrary extensions,
possibly outside the web server's document directory
and fails to
sanitize certain fields when creating new blog entries of malicious
HTML and script code before using them to generate dynamic web pages.
Upgrade to Movable Type 3.2 or later and grant only trusted users the
ability to upload files via the administrative interface.
Low / CVSS Base Score : 3
Click HERE for more information and discussions on this network vulnerability scan.