Vulnerability Details : CVE-2010-3922
SQL injection vulnerability in Movable Type 4.x before 4.35 and 5.x before 5.04 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2010-3922
Probability of exploitation activity in the next 30 days: 0.37%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 69 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3922
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2010-3922
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3922
-
http://www.movabletype.org/documentation/appendices/release-notes/movable-type-504-435-release-notes.html
MovableType.org – Documentation: Movable Type 5.04 and 4.35 Release Notes
-
http://jvn.jp/en/jp/JVN78536512/index.html
JVN#78536512: Movable Type vulnerable to SQL injection
-
http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000061.html
JVNDB-2010-000061 - JVN iPedia
-
http://www.securitytracker.com/id?1024833
Movable Type Input Validation Flaws Permit Cross-Site Scripting Attacks and Lets Remote Users Inject SQL Commands - SecurityTracker
-
http://www.vupen.com/english/advisories/2010/3145
Webmail | OVH- OVH
Products affected by CVE-2010-3922
- cpe:2.3:a:sixapart:movabletype:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.23:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:5.01:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.261:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:5.031:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.25:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.26:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.33:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.34:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.31:*:*:*:*:*:*:*
- cpe:2.3:a:sixapart:movabletype:4.32:*:*:*:*:*:*:*