CVE-2023-36932

8.1 HIGH

📋 TL;DR

This CVE describes multiple SQL injection vulnerabilities in Progress MOVEit Transfer that allow authenticated attackers to modify and disclose database content. Organizations using affected versions of MOVEit Transfer are at risk. The vulnerability requires authentication but can lead to significant data exposure.

💻 Affected Systems

Products:
  • Progress MOVEit Transfer
Versions: Versions before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the web application component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the MOVEit Transfer database including exfiltration of all stored files, user credentials, and sensitive data, potentially leading to ransomware deployment or data destruction.

🟠

Likely Case

Unauthorized access to sensitive files and user data stored in MOVEit, credential theft, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and database permissions restricting the attacker's access scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but SQL injection vulnerabilities are typically easy to weaponize once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), or 2023.0.4 (15.0.4) depending on your version

Vendor Advisory: https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-July-2023

Restart Required: Yes

Instructions:

1. Download the appropriate service pack from Progress support portal. 2. Backup your MOVEit Transfer database and configuration. 3. Apply the service pack following Progress installation documentation. 4. Restart MOVEit Transfer services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to MOVEit Transfer web interface to only trusted IP addresses and networks.

Enhanced Authentication

all

Implement multi-factor authentication and strong password policies to reduce risk from authenticated attacks.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the MOVEit Transfer web interface
  • Enable detailed logging and monitoring for SQL injection attempts and unusual database access patterns

🔍 How to Verify

Check if Vulnerable:

Check your MOVEit Transfer version in the admin interface or via the installed version files. Compare against affected version ranges.

Check Version:

Check MOVEit Transfer admin dashboard or examine version.txt in installation directory

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions listed in the affected systems section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected database access patterns

Network Indicators:

  • SQL injection patterns in HTTP requests to MOVEit endpoints
  • Unusual outbound database connections

SIEM Query:

source="moveit_logs" AND ("sql" OR "injection" OR "union select" OR "sleep(")

🔗 References

📤 Share & Export