This indicates an attack attempt to exploit an Unrestricted File Upload Vulnerability in MOVEit Transfer.
The vulnerability is due to improper sanitization of user supplied input. A remote, unauthenticated attacker can exploit this to upload arbitrary files to the target server. Successfully exploiting this vulnerability can result in uploading of web shells and remote code execution.
A SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. According to the vendor, depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to gather information about the structure and contents of the database and execute SQL statements that can change or delete database elements..
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), 2023.0.1 (15.0.1)
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023