CVE-2015-1592

Movable Type <5.2.12 & <6.0.7 - Code Injection

Title source: llm

Description

Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappslinux
https://www.exploit-db.com/exploits/41697
nomisec WORKING POC 6 stars
by lightsey · poc
https://github.com/lightsey/cve-2015-1592
metasploit WORKING POC GOOD
by John Lightsey · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/sixapart_movabletype_storable_exec.rb

Scores

EPSS 0.8105
EPSS Percentile 99.2%

Details

CWE
CWE-74
Status published
Products (2)
debian/debian_linux 7.0
sixapart/movable_type 5.2.0 - 5.2.12 (3 CPE variants)
Published Feb 19, 2015
Tracked Since Feb 18, 2026