Progress.MOVEit.Transfer.Unrestricted.File.Upload
Description
This indicates an attack attempt to exploit an Unrestricted File Upload Vulnerability in MOVEit Transfer.
The vulnerability is due to improper sanitization of user supplied input. A remote, unauthenticated attacker can exploit this to upload arbitrary files to the target server. Successfully exploiting this vulnerability can result in uploading of web shells and remote code execution.
Outbreak Alert
A SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. According to the vendor, depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to gather information about the structure and contents of the database and execute SQL statements that can change or delete database elements..
Affected Products
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), 2023.0.1 (15.0.1)
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023