发布时间 :2005-12-31 00:00:00
修订时间 :2008-09-05 16:57:33

[原文]Six Apart Movable Type 3.16 allows local users with blog-creation privileges to create or overwrite arbitrary files of certain types (such as HTML and image files) by selecting an arbitrary directory as a blog's top-level directory. NOTE: this issue can be used in conjunction with CVE-2005-3102 to create or overwrite arbitrary files of all types.

[CNNVD]Movable Type任意Blog创建路径漏洞(CNNVD-200512-646)

        Six Apart Movable Type 3.16使得拥有博客创建权限的本地用户可以通过选择一个任意目录作为博客顶级目录来创建或重写某类型的任意文件(如HTML和图像文件)。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  15302
(VENDOR_ADVISORY)  FULLDISC  20051103 Buggy blogging

- 漏洞信息

Movable Type任意Blog创建路径漏洞
低危 访问验证错误
2005-12-31 00:00:00 2006-02-01 00:00:00
        Six Apart Movable Type 3.16使得拥有博客创建权限的本地用户可以通过选择一个任意目录作为博客顶级目录来创建或重写某类型的任意文件(如HTML和图像文件)。

- 公告与补丁


- 漏洞信息

Movable Type Top-level Directory Manipulation Weakness

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-11-03 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Movable Type Arbitrary Blog Creation Path Vulnerability
Access Validation Error 15302
Yes No
2005-11-03 12:00:00 2007-07-06 03:57:00
Tim Brown is credited with the discovery of this vulnerability.

- 受影响的程序版本

Movable Type Movable Type 3.17
Movable Type Movable Type 3.16
Movable Type Movable Type 3.2
Movable Type Movable Type 2.63
Movable Type Movable Type 2.0

- 漏洞讨论

Movable Type is prone to a vulnerability that allows attackers to create files outside of the Movable Type directory path. This issue occurs because the application fails to properly sanitize user-supplied input.

Note that this vulnerability can occur only when a validated user has sufficient permissions to create blog entries.

- 漏洞利用

No exploit is required.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at:

- 相关参考