First published: Tue May 18 2021(Updated: )
In Progress MOVEit Transfer before 2021.0 (13.0), a SQL injection vulnerability has been found in the MOVEit Transfer web app that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or destroy database elements. This is in MOVEit.DMZ.WebApp in SILHuman.vb.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress MOVEit Transfer | <2021.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31827 refers to a SQL injection vulnerability found in MOVEit Transfer before version 2021.0 (13.0).
CVE-2021-31827 has a severity rating of 8.8, which is considered high.
CVE-2021-31827 affects the MOVEit Transfer web app, allowing an authenticated attacker to gain unauthorized access to the database.
The affected version of MOVEit Transfer is before 2021.0 (13.0).
To fix CVE-2021-31827, it is recommended to update MOVEit Transfer to version 2021.0 (13.0) or later.