CVE-2023-34362

CRITICAL KEV RANSOMWARE NUCLEI

MOVEit SQL Injection vulnerability

Title source: metasploit

Description

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.

Exploits (15)

nomisec WORKING POC 140 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2023-34362
nomisec WORKING POC 64 stars
by sfewer-r7 · remote
https://github.com/sfewer-r7/CVE-2023-34362
nomisec WORKING POC 10 stars
by Malwareman007 · remote
https://github.com/Malwareman007/CVE-2023-34362
nomisec WRITEUP 6 stars
by kenbuckler · poc
https://github.com/kenbuckler/MOVEit-CVE-2023-34362
nomisec WORKING POC 2 stars
by errorfiathck · remote
https://github.com/errorfiathck/MOVEit-Exploit
nomisec WRITEUP 2 stars
by deepinstinct · poc
https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs
nomisec WORKING POC 1 stars
by toorandom · poc
https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362
nomisec WRITEUP
by tubaaiftikhar-ui · poc
https://github.com/tubaaiftikhar-ui/MOVEit-Transfer-Data-Breach-Analysis.
nomisec WRITEUP
by khengar9274-web · poc
https://github.com/khengar9274-web/moveit-transfer-2023-breach
nomisec WRITEUP
by Naveenbana5250 · poc
https://github.com/Naveenbana5250/CVE-2023-34362-Defense-Package
github WORKING POC
by iitsmel · htmlpoc
https://github.com/iitsmel/Research/tree/main/CVE-2023-34362
nomisec NO CODE
by aditibv · poc
https://github.com/aditibv/MOVEit-CVE-2023-34362
nomisec WORKING POC
by glen-pearson · remote
https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE
nomisec WRITEUP
by Chinyemba-ck · poc
https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362
metasploit WORKING POC EXCELLENT
by sfewer-r7, rbowes-r7, bwatters-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/moveit_cve_2023_34362.rb

Nuclei Templates (1)

MOVEit Transfer - Remote Code Execution
CRITICALVERIFIEDby princechaddha,rootxharsh,ritikchaddha,pdresearch
Shodan: http.favicon.hash:989289239
FOFA: icon_hash=989289239

Scores

CVSS v3 9.8
EPSS 0.9425
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-06-02
VulnCheck KEV 2023-06-01
InTheWild.io 2023-06-02
ENISA EUVD EUVD-2023-38442
Ransomware Use Confirmed
CWE
CWE-89
Status published
Products (2)
progress/moveit_cloud < 14.0.5.45
progress/moveit_transfer < 2021.0.7
Published Jun 02, 2023
KEV Added Jun 02, 2023
Tracked Since Feb 18, 2026