CVE-2023-35708

9.8 CRITICAL

📋 TL;DR

This is a critical SQL injection vulnerability in Progress MOVEit Transfer that allows unauthenticated attackers to execute arbitrary SQL commands against the application's database. Attackers can modify and exfiltrate sensitive data stored in the MOVEit database. All organizations running vulnerable versions of MOVEit Transfer are affected.

💻 Affected Systems

Products:
  • Progress MOVEit Transfer
Versions: All versions before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web application component and affects all default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the MOVEit database including exfiltration of all stored files, credentials, and sensitive data, potentially leading to ransomware deployment or data destruction.

🟠

Likely Case

Data theft of sensitive files and credentials stored in MOVEit, potentially enabling lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, database permissions, and monitoring are in place, though data exposure risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

This vulnerability was actively exploited in the wild during the MOVEit Transfer attacks of June 2023. Multiple exploit tools are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2020.1.10 (12.1.10), 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), or 2023.0.3 (15.0.3)

Vendor Advisory: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Progress Software's security advisory. 2. Stop the MOVEit Transfer service. 3. Apply the patch according to vendor instructions. 4. Restart the MOVEit Transfer service. 5. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Isolation

all

Immediately block all external access to MOVEit Transfer web interfaces while patching.

Use firewall rules to block inbound traffic to MOVEit Transfer ports (typically 80/443)

Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns targeting MOVEit endpoints.

Configure WAF to block patterns containing SQL keywords and special characters in MOVEit URLs

🧯 If You Can't Patch

  • Immediately take MOVEit Transfer offline and isolate it from the network
  • Implement strict network segmentation and monitor all traffic to/from the MOVEit server

🔍 How to Verify

Check if Vulnerable:

Check the MOVEit Transfer version in the admin interface or compare installed DLL versions against patched versions.

Check Version:

Check MOVEit admin interface or examine file versions in the installation directory

Verify Fix Applied:

Verify the MOVEit Transfer version shows one of the patched versions and check that the vulnerable DLL has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by successful access
  • Unexpected database schema modifications

Network Indicators:

  • Unusual outbound database connections from MOVEit server
  • Large data transfers from MOVEit to external IPs
  • SQL injection patterns in HTTP requests to MOVEit endpoints

SIEM Query:

source="moveit_logs" AND (sql OR injection OR "union select" OR "sleep(" OR benchmark)

🔗 References

📤 Share & Export