HTTP: Movable Type CVE-2015-1592 Remote Code Execution

This signature detects attempts to exploit a known vulnerability against Movable. A successful attack can lead to arbitrary code execution.

Extended Description

Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.

Affected Products

Sixapart movable_type

References

BugTraq: 72606

CVE: CVE-2015-1592

Short Name
HTTP:CTS:CVE-2015-1592-RCE
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2015-1592 Code Execution Movable Remote Type bid:72606
Release Date
04/23/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Sixapart

Debian

CVSS Score

7.5

Found a potential security threat?