iTnews Asia
  • Home
  • News
  • Security

More MOVEit vulnerabilities disclosed, patched

More MOVEit vulnerabilities disclosed, patched

Database contents could be exposed.

By Richard Chirgwin on Jul 10, 2023 11:37AM

Progress Software late last week shipped fixes for further vulnerabilities in its MOVEit Transfer software, with the US Cyber and Infrastructure Security Agency (CISA) urging users to install the patches immediately.

CISA noted that CVE-2023-36934, CVE-2023-36932 and CVE-2023-36933 are new vulnerabilities.

The most serious vulnerability is CVE-2023-36934, which Progress Software rates as “critical”.

Unpatched versions of the MOVEit Transfer web application have a SQL injection vulnerability.

If triggered by a crafted payload, the vulnerability can be exploited to get unauthorised access to the MOVEit Transfer database, exposing database content to “modification and disclosure”.

The bug is credited to Guy Lederfein of Trend Micro working with the Zero Day Initiative.

CVE-2023-36932 identifies a number of other SQL injection vulnerabilities rated “high” severity. 

Once again, the vulnerabilities can be triggered by crafted payloads to expose the database to modification and disclosure.

Progress Software credits these bugs to cchav3z at HackerOne, Nicolas Zilio for CrowdStrike and hoangha2, hoangnx, and duongdpt (Q5Ca) with VCSLAB of Viettel Cyber Security.

Finally, CVE-2023-36933 allows an attacker to crash MOVEit Transfer by invoking “a method that results in an unhandled exception.”

James Horseman at HackerOne is credited with discovering this vulnerability.

Progress Software published patches for the bugs late last week.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
moveit progress software security

Related Articles

  • Five tips a CIO or CSO should know to stop employee-driven IP theft
  • StarHub launches app to protect customers from scam calls and SMS
  • Beware the rise of ‘vishing’ as a cyber threat in APAC
  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Five tips a CIO or CSO should know to stop employee-driven IP theft

Five tips a CIO or CSO should know to stop employee-driven IP theft

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

Beware the rise of ‘vishing’ as a cyber threat in APAC

Beware the rise of ‘vishing’ as a cyber threat in APAC

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.