First published: Thu May 14 2020(Updated: )
An issue was discovered in Progress MOVEit Automation Web Admin. A Web Admin application endpoint failed to adequately sanitize malicious input, which could allow an unauthenticated attacker to execute arbitrary code in a victim's browser, aka XSS. This affects 2018 - 2018.0 prior to 2018.0.3, 2018 SP1 - 2018.2 prior to 2018.2.3, 2018 SP2 - 2018.3 prior to 2018.3.7, 2019 - 2019.0 prior to 2019.0.3, 2019.1 - 2019.1 prior to 2019.1.2, and 2019.2 - 2019.2 prior to 2019.2.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress MOVEit Automation | >=2018.0<2018.0.3 | |
Progress MOVEit Automation | >=2018.2<2018.2.3 | |
Progress MOVEit Automation | >=2018.3<2018.3.7 | |
Progress MOVEit Automation | >=2019.0<2019.0.3 | |
Progress MOVEit Automation | >=2019.1<2019.1.2 | |
Progress MOVEit Automation | >=2019.2<2019.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12677 is a vulnerability in Progress MOVEit Automation Web Admin that allows an unauthenticated attacker to execute arbitrary code in a victim's browser.
CVE-2020-12677 has a severity of 6.1 (medium).
Progress MOVEit Automation versions 2018 - 2018.0.3, 2018.2 - 2018.2.3, 2018.3 - 2018.3.7, 2019.0 - 2019.0.3, 2019.1 - 2019.1.2, and 2019.2 - 2019.2.2 are affected by CVE-2020-12677.
An attacker can exploit CVE-2020-12677 by injecting malicious input into the Progress MOVEit Automation Web Admin application endpoint, leading to cross-site scripting (XSS) attacks.
You can find more information about CVE-2020-12677 at the following references: [Link 1](https://community.progress.com/s/article/MOVEit-Automation-Cross-Site-Scripting-Vulnerability-XSS-May-2020), [Link 2](https://docs.ipswitch.com/MOVEit/Automation2018/ReleaseNotes/en/index.htm#33958.htm), [Link 3](https://docs.ipswitch.com/MOVEit/Automation2018SP1/ReleaseNotes/en/index.htm#33958.htm).