First published: Thu May 18 2017(Updated: )
Ipswitch MOVEit Transfer (formerly DMZ) allows pre-authentication blind SQL injection. The fixed versions are MOVEit Transfer 2017 9.0.0.201, MOVEit DMZ 8.3.0.30, and MOVEit DMZ 8.2.0.20.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch MOVEit DMZ | <=8.1 | |
Ipswitch MOVEit DMZ | =8.2 | |
Ipswitch MOVEit DMZ | =8.3 | |
MOVEit Transfer | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6195 is classified as a critical vulnerability due to its ability to allow pre-authentication blind SQL injection.
To fix CVE-2017-6195, upgrade to MOVEit Transfer version 9.0.0.201 or MOVEit DMZ versions 8.3.0.30 or 8.2.0.20.
CVE-2017-6195 affects Ipswitch MOVEit Transfer 2017 prior to 9.0.0.201 and MOVEit DMZ versions prior to 8.3.0.30.
Yes, CVE-2017-6195 is exploitable remotely since it allows blind SQL injection without authentication.
CVE-2017-6195 is a blind SQL injection vulnerability that can be exploited pre-authentication.