Show plain JSON{"id": "CVE-2022-43660", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2022-12-07T04:15:10.900", "references": [{"url": "https://jvn.jp/en/jp/JVN37014768/index.html", "tags": ["Third Party Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "https://movabletype.org/news/2022/11/mt-796-688-released.html", "tags": ["Release Notes", "Vendor Advisory"], "source": "vultures@jpcert.or.jp"}, {"url": "https://jvn.jp/en/jp/JVN37014768/index.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://movabletype.org/news/2022/11/mt-796-688-released.html", "tags": ["Release Notes", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of 'Manage of Content Types' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier."}, {"lang": "es", "value": "La neutralizaci\u00f3n incorrecta de Server-Side Includes (SSW) dentro de una p\u00e1gina web de la serie Movable Type permite que un atacante remoto autenticado con el privilegio de 'Administrar tipos de contenido' pueda ejecutar un script Perl arbitrario y/o un comando del sistema operativo arbitrario. Los productos/versiones afectados son los siguientes: Movable Type 7 r.5301 y anteriores (Serie Movable Type 7), Movable Type Advanced 7 r.5301 y anteriores (Serie Movable Type Advanced 7), Movable Type Premium 1.53 y anteriores, y Movable Type Premium Avanzado 1.53 y anteriores."}], "lastModified": "2025-04-23T14:15:22.737", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium:*:*:*", "vulnerable": true, "matchCriteriaId": "4EBDEEB4-E2A9-4D7B-AAFF-8657E9708A24", "versionEndIncluding": "1.53"}, {"criteria": "cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium_advanced:*:*:*", "vulnerable": true, "matchCriteriaId": "7A3C1F5D-755D-4FC4-975D-314C602BE0D4", "versionEndIncluding": "1.53"}, {"criteria": "cpe:2.3:a:sixapart:movable_type:*:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "7EBB4183-9E9B-4686-9692-0223FAA34019", "versionEndExcluding": "7.9.6", "versionStartIncluding": "7.0"}, {"criteria": "cpe:2.3:a:sixapart:movable_type:*:*:*:*:advanced:*:*:*", "vulnerable": true, "matchCriteriaId": "123C8E47-C983-401D-A081-033E94E112D0", "versionEndExcluding": "7.9.6", "versionStartIncluding": "7.0"}], "operator": "OR"}]}], "sourceIdentifier": "vultures@jpcert.or.jp"}