Progress.MOVEit.Transfer.Unrestricted.File.Upload

description-logoDescription

This indicates an attack attempt to exploit an Unrestricted File Upload Vulnerability in MOVEit Transfer.
The vulnerability is due to improper sanitization of user supplied input. A remote, unauthenticated attacker can exploit this to upload arbitrary files to the target server. Successfully exploiting this vulnerability can result in uploading of web shells and remote code execution.

description-logoOutbreak Alert

A SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. According to the vendor, depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to gather information about the structure and contents of the database and execute SQL statements that can change or delete database elements..

View the full Outbreak Alert Report

affected-products-logoAffected Products

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), 2023.0.1 (15.0.1)

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor:
https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-07 25.615 Sig Added
2023-06-26 24.589 Default_action:pass:drop
2023-06-15 24.579 Sig Added
2023-06-05 23.570