CVE-2013-0209
Movable Type 4.2x, 4.3x Web Upgrade Remote Code Execution
Title source: metasploitDescription
lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.
Exploits (2)
metasploit
WORKING POC
EXCELLENT
by Kacper Nowak, Nick Blundell, Gary O\ · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/movabletype_upgrade_exec.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/24321
References (4)
Scores
EPSS
0.8063
EPSS Percentile
99.1%
Classification
CWE
CWE-287
Status
draft
Affected Products (33)
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
sixapart/movable_type
... and 18 more
Timeline
Published
Jan 23, 2013
Tracked Since
Feb 18, 2026