MOVEit Transfer 漏洞列表
共找到 10 个与 MOVEit Transfer 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2023-34362: MOVEit Transfer - Remote Code Execution POC
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions. -
CVE-2023-36934: MOVEit Transfer - SQL Injection POC
In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. -
CVE-2023-34362: MOVEit Transfer - Remote Code Execution POC
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions. -
CVE-2023-36934: MOVEit Transfer - SQL Injection POC
In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. -
Progress MOVEit Transfer 身份验证绕过漏洞 无POC
Progress MOVEit Transfer 中存一个身份验证绕过漏洞,当攻击者知道一个有效用户名时可以绕过身份验证冒充任意用户登录系统,获取服务器上的敏感数据。漏洞威胁等级:高危,漏洞编号:CVE-2024-5806。 -
Progress MOVEit Transfer SILCertToUser SQL注入漏洞 无POC
MOVEit Transfer中存在SQL注入漏洞。该漏洞是由于对 "/certtousergw.aspx" 的输入验证有缺陷所导致的。 -
Progress MOVEit Transfer moveitisapi SQL注入漏洞 无POC
-
Progress MOVEit Transfer FolderListRecursive SQL注入漏洞 无POC
-
Progress MOVEit Transfer X-siLock-FileID SQL注入漏洞 无POC
-
Progress MOVEit Transfer UserEngine UserCheckClientCert SQL注入漏洞 无POC