CVE-2023-34362

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*

History

20 Dec 2024, 17:49

Type Values Removed Values Added
Summary
  • (es) En Progress MOVEit Transfer antes de 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5) y 2023.0.1 (15.0.1), se ha encontrado una vulnerabilidad de inyección SQL en la aplicación web MOVEit Transfer que podría permitir que un atacante no autenticado obtenga acceso a la base de datos de MOVEit Transfer. Según el motor de base de datos que se utilice (MySQL, Microsoft SQL Server o Azure SQL), un atacante puede inferir información sobre la estructura y el contenido de la base de datos, y ejecutar instrucciones SQL que alteren o eliminen elementos de la base de datos. NOTA: esto se explota en la naturaleza en mayo y junio de 2023; la explotación de sistemas sin parches puede ocurrir a través de HTTP o HTTPS. Todas las versiones (por ejemplo, 2020.0 y 2019x) anteriores a las cinco versiones mencionadas explícitamente se ven afectadas, incluidas las versiones más antiguas no compatibles.

21 Nov 2024, 08:07

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023 - Vendor Advisory () https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023 - Vendor Advisory

27 Jun 2024, 19:15

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html - () http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry

14 Jun 2023, 00:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html -

12 Jun 2023, 14:07

Type Values Removed Values Added
CWE CWE-89
CPE cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
References (MISC) https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023 - (MISC) https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

05 Jun 2023, 05:15

Type Values Removed Values Added
Summary In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.

02 Jun 2023, 14:32

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-02 14:15

Updated : 2024-12-20 17:49


NVD link : CVE-2023-34362

Mitre link : CVE-2023-34362

CVE.ORG link : CVE-2023-34362


JSON object : View

Products Affected

progress

  • moveit_transfer
  • moveit_cloud
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')