CVE-2017-6195
📋 TL;DR
CVE-2017-6195 is a critical SQL injection vulnerability in Ipswitch MOVEit Transfer (formerly DMZ) that allows attackers to execute arbitrary SQL commands without authentication. This affects organizations using vulnerable versions of MOVEit Transfer or MOVEit DMZ for secure file transfer. Successful exploitation could lead to complete compromise of the database and potentially the underlying server.
💻 Affected Systems
- Ipswitch MOVEit Transfer
- Ipswitch MOVEit DMZ
📦 What is this software?
Moveit Dmz by Ipswitch
Moveit Dmz by Ipswitch
Moveit Dmz by Ipswitch
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, and potential remote code execution on the underlying server.
Likely Case
Database information disclosure, data manipulation, and potential authentication bypass to access sensitive files.
If Mitigated
Limited impact with proper network segmentation, WAF rules blocking SQL injection patterns, and database hardening.
🎯 Exploit Status
Blind SQL injection allows exploitation without seeing results directly. Public technical details available in referenced advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: MOVEit Transfer 2017 9.0.0.201, MOVEit DMZ 8.3.0.30, or MOVEit DMZ 8.2.0.20
Vendor Advisory: http://ft.ipswitch.com/rs/751-HBN-596/images/Ipswitch-Security-Bulletin-FT-Vulnerability.pdf
Restart Required: Yes
Instructions:
1. Download the appropriate patch from Ipswitch support portal. 2. Backup current installation and database. 3. Apply the patch following vendor instructions. 4. Restart the MOVEit service. 5. Verify the version is updated.
🔧 Temporary Workarounds
Web Application Firewall Rules
allImplement WAF rules to block SQL injection patterns targeting MOVEit endpoints
WAF-specific rules to block SQL injection patterns in POST/GET parameters
Network Segmentation
allRestrict access to MOVEit servers to only trusted IP addresses
firewall rules to limit access to specific source IP ranges
🧯 If You Can't Patch
- Isolate the MOVEit server in a separate network segment with strict access controls
- Implement database monitoring and alerting for suspicious SQL queries
🔍 How to Verify
Check if Vulnerable:
Check MOVEit version in admin interface or via file properties. Compare against vulnerable versions list.
Check Version:
Check MOVEit admin interface → System Information or examine file properties of MOVEit executables
Verify Fix Applied:
Verify version number matches patched versions: 9.0.0.201 for MOVEit Transfer 2017, 8.3.0.30 or 8.2.0.20 for MOVEit DMZ
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in MOVEit logs
- Multiple failed authentication attempts followed by SQL-like patterns in requests
Network Indicators:
- SQL injection patterns in HTTP requests to MOVEit endpoints
- Unusual database queries from MOVEit application server
SIEM Query:
source="moveit.logs" AND ("sql" OR "injection" OR "syntax error" OR "union select")
🔗 References
- http://ft.ipswitch.com/rs/751-HBN-596/images/Ipswitch-Security-Bulletin-FT-Vulnerability.pdf
- https://www.siberas.de/assets/papers/ssa-1705_IPSWITCH_SQLinjection.txt
- http://ft.ipswitch.com/rs/751-HBN-596/images/Ipswitch-Security-Bulletin-FT-Vulnerability.pdf
- https://www.siberas.de/assets/papers/ssa-1705_IPSWITCH_SQLinjection.txt