First published: Fri Feb 14 2020(Updated: )
In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, multiple SQL Injection vulnerabilities have been found in the REST API that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database via the REST API. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or destroy database elements.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progess Moveit Transfer | >=2019.1<2019.1.4 | |
Progress MOVEit Transfer | >=2019.2<2019.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8611.
The severity of CVE-2020-8611 is high, with a CVSS score of 8.8.
The affected software is In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1.
The vulnerability could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database via the REST API.
To fix CVE-2020-8611, it is recommended to update to the latest version of MOVEit Transfer (2019.1.4 or 2019.2.1).