Goby/json/MovableType-RCE-(CVE-2021-2...

69 lines
3.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "MovableType RCE (CVE-2021-20837)",
"Description": "<p>MovableType is a safe, high-speed, serverless SaaS type comprehensive CMS system.</p><p>Unauthorized command execution exists when the MovableType management system processes XMLRPC requests, and attackers can obtain server permissions.</p>",
"Product": "MovableType",
"Homepage": "https://movabletype.net/",
"DisclosureDate": "2021-10-25",
"Author": "1291904552@qq.com",
"FofaQuery": "body=\"Movable Type\"",
"GobyQuery": "body=\"Movable Type\"",
"Level": "3",
"Impact": "<p>Unauthorized command execution exists when the MovableType management system processes XMLRPC requests, and attackers can obtain server permissions.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://movabletype.net\">https://movabletype.net</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "MovableType 管理系统远程命令执行漏洞CVE-2021-20837",
"Product": "MovableType",
"VulType": ["命令执行"],
"Tags": ["命令执行"],
"Description": "<p>MovableType是一款安全、高速、无服务器的SaaS型全面CMS系统。</p><p>MovableType 管理系统处理 XMLRPC 请求时存在未授权的命令执行,攻击者可获取服务器权限。</p>",
"Impact": "<p>MovableType 管理系统处理 XMLRPC 请求时存在未授权的命令执行,攻击者可获取服务器权限。</p>",
"Recommendation": "<p>厂商暂未提供修复方案,请关注厂商网站及时更新: <a href=\"https://movabletype.net\">https://movabletype.net</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "MovableType RCE (CVE-2021-20837)",
"Product": "MovableType",
"VulType": ["rce"],
"Tags": ["rce"],
"Description": "<p>MovableType is a safe, high-speed, serverless SaaS type comprehensive CMS system.</p><p>Unauthorized command execution exists when the MovableType management system processes XMLRPC requests, and attackers can obtain server permissions.</p>",
"Impact": "<p>Unauthorized command execution exists when the MovableType management system processes XMLRPC requests, and attackers can obtain server permissions.</p>",
"Recommendation": "<p>There is currently no detailed solution provided, please pay attention to the manufacturer's homepage update: <a href=\"https://movabletype.net\">https://movabletype.net</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://nemesis.sh/posts/movable-type-0day/"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "id"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"rce"
],
"VulType": [
"rce"
],
"CVEIDs": [
"CVE-2021-20837"
],
"CVSSScore": "9.0",
"AttackSurfaces": {
"Application": ["MovableType"],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
""
],
"CNVD": [
""
]
}