CVE-2023-35036

9.1 CRITICAL

📋 TL;DR

CVE-2023-35036 is a critical SQL injection vulnerability in Progress MOVEit Transfer that allows unauthenticated attackers to execute arbitrary SQL commands against the database. This can lead to data theft, modification, or complete database compromise. All organizations running affected versions of MOVEit Transfer are at risk.

💻 Affected Systems

Products:
  • Progress MOVEit Transfer
Versions: All versions before 2021.0.7 (13.0.7), 2021.1.5 (13.1.5), 2022.0.5 (14.0.5), 2022.1.6 (14.1.6), and 2023.0.2 (15.0.2)
Operating Systems: All supported platforms running MOVEit Transfer
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, data destruction, privilege escalation, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive data stored in MOVEit Transfer database, including files, user credentials, and configuration information.

🟢

If Mitigated

Limited impact due to network segmentation, WAF protection, and minimal database privileges, though risk remains significant.

🌐 Internet-Facing: HIGH - The vulnerability affects web application endpoints accessible over the internet, making internet-facing instances prime targets.
🏢 Internal Only: HIGH - Even internally accessible instances are at significant risk from insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

This vulnerability was actively exploited in the wild during the MOVEit Transfer attacks of 2023. Exploitation requires no authentication and has low technical complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.0.7 (13.0.7), 2021.1.5 (13.1.5), 2022.0.5 (14.0.5), 2022.1.6 (14.1.6), or 2023.0.2 (15.0.2) depending on your version

Vendor Advisory: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-CVE-2023-35036-June-9-2023

Restart Required: Yes

Instructions:

1. Identify your current MOVEit Transfer version. 2. Download the appropriate patch from Progress Software support portal. 3. Apply the patch following Progress installation instructions. 4. Restart the MOVEit Transfer service. 5. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Segmentation and Access Control

all

Restrict network access to MOVEit Transfer to only trusted IP addresses and implement strict firewall rules.

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious payloads.

🧯 If You Can't Patch

  • Immediately isolate the MOVEit Transfer server from the internet and restrict internal network access
  • Implement database monitoring and alerting for suspicious SQL queries and access patterns

🔍 How to Verify

Check if Vulnerable:

Check MOVEit Transfer version via the web interface (Admin > About) or by examining installation files. Compare against affected version ranges.

Check Version:

Check via web interface at https://[your-moveit-server]/Admin/About or examine the MOVEit installation directory for version files.

Verify Fix Applied:

Verify version number matches patched versions: 2021.0.7 (13.0.7), 2021.1.5 (13.1.5), 2022.0.5 (14.0.5), 2022.1.6 (14.1.6), or 2023.0.2 (15.0.2).

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by successful access
  • Unexpected database schema modifications
  • Suspicious user agent strings in web server logs

Network Indicators:

  • Unusual outbound database connections from MOVEit server
  • SQL injection patterns in HTTP requests to MOVEit endpoints
  • Traffic to known malicious IP addresses from MOVEit server

SIEM Query:

source="moveit_logs" AND ("sql injection" OR "malformed query" OR "unusual database access") OR source="web_logs" AND (uri="*sql*" OR user_agent="*sqlmap*")

🔗 References

📤 Share & Export