First published: Fri Jun 02 2023(Updated: )
Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Moveit Cloud | <14.0.5.45 | |
Progress Moveit Cloud | >=14.1.0.0<14.1.6.97 | |
Progress Moveit Cloud | >=15.0.0.0<15.0.2.39 | |
Progress MOVEit Transfer | <=2020.1.6 | |
Progress MOVEit Transfer | >=2021.0<2021.0.7 | |
Progress MOVEit Transfer | >=2021.1.0<2021.1.5 | |
Progress MOVEit Transfer | >=2022.0.0<2022.0.5 | |
Progress MOVEit Transfer | >=2022.1.0<2022.1.6 | |
Progress MOVEit Transfer | >=2023.0.0<2023.0.2 | |
Progress MOVEit Transfer | <2021.0.7 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of Progress MOVEit Transfer SQL Injection Vulnerability is CVE-2023-34362.
The affected software by CVE-2023-34362 is Progress MOVEit Transfer.
CVE-2023-34362 is a SQL injection vulnerability in Progress MOVEit Transfer which could allow an unauthenticated attacker to gain access to the application's database.
To fix CVE-2023-34362, it is recommended to upgrade to Progress MOVEit Transfer versions 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), or 2023.0.1 (15.0.1) where the vulnerability is patched.
You can find more information about CVE-2023-34362 in the following references: [1] [2] [3].