MOVEit Transfer and MOVEit Cloud Vulnerability
A new SQL injection vulnerability in the MOVEit Transfer app and MOVEit Cloud has been discovered (CVE-2023-35036)
Summary
A new SQL injection vulnerability in the MOVEit Transfer app and MOVEit Cloud has been discovered (CVE-2023-35036)
Affected platforms
The following platforms are known to be affected:
Threat details
Additional Vulnerability to Progress MOVEit Transfer Critical Vulnerability
This Cyber Alert covers CVE-2023-35036, an SQL injection vulnerability identified by Progress as distinct from the previous SQL injection vulnerability referenced in CC-4326 (CVE-2023-34362).
Introduction
Progress (formerly Ipswitch) has released an additional security update and mitigations for a newly discovered vulnerability found in MOVEit Transfer and MOVEit Cloud applications. The critical vulnerability, tracked as CVE-2023-35036, could allow an unauthenticated remote attacker to gain access to the environment, and infer information about the structure and contents of the MOVEit database.
Progress have reported that CVE-2023-35036 was discovered following detailed code reviews into their products. There are no reports of this vulnerability being exploited in the wild at this time.
Remediation advice
MOVEit Transfer customers are encouraged to review the MOVEit Transfer advisory and apply relevant mitigations and updates as soon as practicable.
MOVEit Cloud customers are encouraged to review the MOVEit Cloud advisory, reflecting that all MOVEit Cloud clusters have been updated and no further action is required at this time.
Definitive source of threat updates
- https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability
- https://community.progress.com/s/article/Status-June-2023-security-vulnerabilities-in-MOVEit-Cloud
- https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-CVE-Pending-Reserve-Status-June-9-2023
- https://community.progress.com/s/article/MOVEit-Security-Best-Practices-Guide
Last edited: 15 June 2023 3:01 pm