CVE-2023-35708

CRITICAL EXPLOITED RANSOMWARE NUCLEI

Progress Moveit Transfer < 2020.1.10 - SQL Injection

Title source: rule

Description

In Progress MOVEit Transfer before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. These are fixed versions of the DLL drop-in: 2020.1.10 (12.1.10), 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3).

Nuclei Templates (1)

MOVEit Transfer - SQL Injection
CRITICALVERIFIEDby daffainfo,jjcho
Shodan: http.favicon.hash:989289239
FOFA: icon_hash=989289239

Scores

CVSS v3 9.8
EPSS 0.7378
EPSS Percentile 98.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-08-30
Ransomware Use Confirmed
CWE
CWE-89
Status published
Products (1)
progress/moveit_transfer < 2020.1.10
Published Jun 16, 2023
Tracked Since Feb 18, 2026