---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Movable Type Cross-Site Scripting and Security Bypass SECUNIA ADVISORY ID: SA23980 VERIFY ADVISORY: http://secunia.com/advisories/23980/ CRITICAL: Less critical IMPACT: Security Bypass, Cross Site Scripting WHERE: >From remote SOFTWARE: Movable Type 3.x http://secunia.com/product/5753/ DESCRIPTION: Some vulnerabilities have been reported in Movable Type, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks. 1) Certain malformed input is not properly sanitised before being returned to a user. This can be exploited to execute HTML and script code in a user's browser session in context of an affected site. Note: This may affect Internet Explorer only. 2) An unspecified error exists within the handling of the "MTCommentPreviewIsStatic" tag, which can be exploited to gain access to the comment entry screen. The vulnerabilities are reported in versions prior to 3.34 beta. SOLUTION: The vulnerabilities are fixed in the latest version of 3.34 beta. PROVIDED AND/OR DISCOVERED BY: 1) teracci2002 2) Reported by the vendor. ORIGINAL ADVISORY: http://www.sixapart.com/movabletype/beta/distros/MT-3.34-beta-Release-Notes.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------