First published: Wed Sep 20 2023(Updated: )
In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a reflected cross-site scripting (XSS) vulnerability has been identified in MOVEit Transfer's web interface. An attacker could craft a malicious payload targeting MOVEit Transfer users during the package composition procedure. If a MOVEit user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Credit: security@progress.com security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress MOVEit Transfer | <2021.1.8 | |
Progress MOVEit Transfer | >=2022.0.0<2022.0.8 | |
Progress MOVEit Transfer | >=2022.1.0<2022.1.9 | |
Progress MOVEit Transfer | >=2023.0.0<2023.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42656 is a reflected cross-site scripting (XSS) vulnerability found in MOVEit Transfer's web interface.
MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), and 2023.0.6 (15.0.6) are affected by CVE-2023-42656.
The severity of CVE-2023-42656 is medium with a score of 6.1.
An attacker can exploit CVE-2023-42656 by crafting a malicious payload and targeting MOVEit Transfer's web interface.
To mitigate the vulnerability in MOVEit Transfer, update to version 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), or 2023.0.6 (15.0.6) or later.