First published: Sat Aug 07 2021(Updated: )
In certain Progress MOVEit Transfer versions before 2021.0.4 (aka 13.0.4), SQL injection in the MOVEit Transfer web application could allow an unauthenticated remote attacker to gain access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, or execute SQL statements that alter or delete database elements, via crafted strings sent to unique MOVEit Transfer transaction types. The fixed versions are 2019.0.8 (11.0.8), 2019.1.7 (11.1.7), 2019.2.4 (11.2.4), 2020.0.7 (12.0.7), 2020.1.6 (12.1.6), and 2021.0.4 (13.0.4).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress MOVEit Transfer | <2019.0.8 | |
Progress MOVEit Transfer | >=2019.1<2019.1.7 | |
Progress MOVEit Transfer | >=2019.2<2019.2.4 | |
Progress MOVEit Transfer | >=2020.0<2020.0.7 | |
Progress MOVEit Transfer | >=2020.1<2020.1.6 | |
Progress MOVEit Transfer | >=2021.0<2021.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-38159.
The severity of CVE-2021-38159 is critical with a severity value of 9.8.
Certain versions of Progress MOVEit Transfer before 2021.0.4 (aka 13.0.4) are affected by CVE-2021-38159.
CVE-2021-38159 allows an unauthenticated remote attacker to gain access to the database.
Yes, the fix for CVE-2021-38159 is to upgrade to Progress MOVEit Transfer version 2021.0.4 (aka 13.0.4) or later.