Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-35708SQL Injection in Moveit Transfer

CWE-89SQL Injection8 documents7 sources
Severity
9.8CRITICALNVD
EPSS
73.8%
top 1.18%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 16
Latest updateOct 4

Description

In Progress MOVEit Transfer before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. These are f

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages10 packages

NVDprogress/moveit_transfer2021.0.62021.0.8+5
Palo Altopaloalto/pan-os
Palo Altopaloalto/prisma_sd

Patches

🔴Vulnerability Details

3
GHSA
GHSA-w5r2-4jr9-2g3q: Progress MOVEit Transfer has a privilege escalation vulnerability that can be addressed with DLL drop-in version 20232023-06-16
CVEList
CVE-2023-35708: In Progress MOVEit Transfer before 20212023-06-16
VulnCheck
Progress MOVEit Transfer Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')2023

💥Exploits & PoCs

1
Nuclei
MOVEit Transfer - SQL Injection

📋Vendor Advisories

1
Palo Alto
PAN-SA-2023-0003 Informational Bulletin: Impact of MOVEit Vulnerabilities (CVE-2023-34362, CVE-2023-35036, CVE-2023-35708)2023-06-16

🕵️Threat Intelligence

1
Unit42
Threat Brief - MOVEit Transfer SQL Injection Vulnerabilities: CVE-2023-34362, CVE-2023-35036 and CVE-2023-35708 (Updated Oct 4)2023-10-04
CVE-2023-35708 — SQL Injection in Moveit Transfer | cvebase