CVE-2023-35708
CRITICAL EXPLOITED RANSOMWARE NUCLEIProgress Moveit Transfer < 2020.1.10 - SQL Injection
Title source: ruleDescription
In Progress MOVEit Transfer before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. These are fixed versions of the DLL drop-in: 2020.1.10 (12.1.10), 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3).
Nuclei Templates (1)
MOVEit Transfer - SQL Injection
CRITICALVERIFIEDby daffainfo,jjcho
Shodan:
http.favicon.hash:989289239
FOFA:
icon_hash=989289239
References (3)
Scores
CVSS v3
9.8
EPSS
0.7378
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-08-30
Ransomware Use
Confirmed
CWE
CWE-89
Status
published
Products (1)
progress/moveit_transfer
< 2020.1.10
Published
Jun 16, 2023
Tracked Since
Feb 18, 2026