First published: Wed Sep 20 2023(Updated: )
In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer web interface that could allow a MOVEit system administrator account to gain unauthorized access to the MOVEit Transfer database. A MOVEit system administrator could submit a crafted payload to the MOVEit Transfer web interface which could result in modification and disclosure of MOVEit database content.
Credit: security@progress.com security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress MOVEit Transfer | <2021.1.8 | |
Progress MOVEit Transfer | >=2022.0.0<2022.0.8 | |
Progress MOVEit Transfer | >=2022.1.0<2022.1.9 | |
Progress MOVEit Transfer | >=2023.0.0<2023.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40043 is a SQL injection vulnerability in In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), and 2023.0.6 (15.0.6).
CVE-2023-40043 allows a MOVEit system administrator account to gain unauthorized access through the MOVEit Transfer web interface.
CVE-2023-40043 has a severity value of 7.2 (high).
CVE-2023-40043 affects Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), and 2023.0.6 (15.0.6).
To fix CVE-2023-40043, you should upgrade to the latest version of Progress MOVEit Transfer (2021.1.8, 2022.0.8, 2022.1.9, or 2023.0.6) which includes a patch for the vulnerability.