Advisory Details

July 5th, 2023

Progress Software MOVEit Transfer UserProcessPassChangeRequest SQL Injection Remote Code Execution Vulnerability

ZDI-23-897
ZDI-CAN-21496

CVE ID CVE-2023-36934
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Progress Software
AFFECTED PRODUCTS MOVEit Transfer
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Progress Software MOVEit Transfer. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the human.aspx endpoint. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the moveitsvc user.

ADDITIONAL DETAILS Progress Software has issued an update to correct this vulnerability. More details can be found at:
https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-July-2023
DISCLOSURE TIMELINE
  • 2023-06-22 - Vulnerability reported to vendor
  • 2023-07-05 - Coordinated public release of advisory
  • 2023-07-06 - Advisory Updated
CREDIT Guy Lederfein of Trend Micro Security Research
BACK TO ADVISORIES