Critical SQL Injection Vulnerability Uncovered in MOVEit Transfer
Progress Software Corporation has recently disclosed a critical vulnerability in its MOVEit Transfer web application, urging users to take immediate action to mitigate the risk.
The vulnerability, officially designated as CVE-2023-34362, is an SQL Injection vulnerability that could potentially lead to escalated privileges and unauthorized access. It affects versions prior to 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1) and has already been exploited in the wild in May and June 2023.

All versions of MOVEit Transfer are vulnerable to this exploit. Unpatched systems are particularly susceptible to attacks via HTTP or HTTPS. However, a variety of products are not impacted, including MOVEit Automation, MOVEit Client, MOVEit Add-in for Microsoft Outlook, MOVEit Mobile, WS_FTP Client, WS_FTP Server, MOVEit EZ, MOVEit Gateway, MOVEit Analytics, and MOVEit Freely.
The company advises MOVEit Transfer customers to take immediate action. Although a security patch is in the works, users are encouraged to implement a number of mitigation measures to defend their systems from potential unauthorized access.
These steps include temporarily disabling HTTP and HTTPS traffic, a comprehensive review of the system, deletion of unauthorized files and user accounts, resetting service account credentials for affected systems, application of available security patches, and re-enabling of HTTP and HTTPS traffic. Continuous monitoring, even after these steps are taken, is crucial to ensure the system’s security.
Progress also suggests implementing general security best practices, such as regularly reviewing and removing any unauthorized user accounts, updating network firewall rules, restricting remote access to trusted IP addresses, and enabling multi-factor authentication.
Apply the Patch
Affected Version | Fixed Version | Documentation |
MOVEit Transfer 2023.0.0 (15.0) | MOVEit Transfer 2023.0.1 | MOVEit 2023 Upgrade Documentation |
MOVEit Transfer 2022.1.x (14.1) | MOVEit Transfer 2022.1.5 | MOVEit 2022 Upgrade Documentation |
MOVEit Transfer 2022.0.x (14.0) | MOVEit Transfer 2022.0.4 | |
MOVEit Transfer 2021.1.x (13.1) | MOVEit Transfer 2021.1.4 | MOVEit 2021 Upgrade Documentation |
MOVEit Transfer 2021.0.x (13.0) | MOVEit Transfer 2021.0.6 | |
MOVEit Transfer 2020.1.x (12.1) | Special Patch Available | See KB 000234559 |
MOVEit Transfer 2020.0.x (12.0) or older | MUST upgrade to a supported version | See MOVEit Transfer Upgrade and Migration Guide |
Certain potential indicators of compromise have been highlighted by the company. These include unexpected file paths and filenames, unusual HTTP requests, unknown user accounts, unrecognized IPv4 addresses or CIDR, unknown domains, and SHA256 hashes that match those listed in the indicators table.
Indicators of Compromise
Indicator | Type | Date Added |
C:\Windows\TEMP\[random]\[random].cmdline | Folder Path | 01-Jun-2023 |
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\root\[random]\[random]\App_Web_[random].dll | Filename | 02-Jun-2023 |
human2.aspx | Filename | 01-Jun-2023 |
human2.aspx.lnk | Filename | 01-Jun-2023 |
POST /moveitisapi/moveitisapi.dll | HTTP Request | 01-Jun-2023 |
POST /guestaccess.aspx | HTTP Request | 01-Jun-2023 |
POST /api/v1/folders/[random]/files | HTTP Request | 01-Jun-2023 |
GET /human2.aspx | HTTP Request | 02-Jun-2023 |
Health Check Service | User Account | 01-Jun-2023 |
5.252.23.116 | IPv4 | 01-Jun-2023 |
5.252.25.88 | IPv4 | 01-Jun-2023 |
84.234.96.104 | IPv4 | 01-Jun-2023 |
89.39.105.108 | IPv4 | 01-Jun-2023 |
138.197.152.201 | IPv4 | 01-Jun-2023 |
148.113.152.144 | IPv4 | 01-Jun-2023 |
198.12.76.214 | IPv4 | 01-Jun-2023 |
198.27.75.110 | IPv4 | 03-Jun-2023 |
209.97.137.33 | IPv4 | 01-Jun-2023 |
209.222.103.170 | IPv4 | 01-Jun-2023 |
188.241.58.0/24 | CIDR | 03-Jun-2023 |
5.252.189.0/24 | CIDR | 01-Jun-2023 |
5.252.190.0/24 | CIDR | 01-Jun-2023 |
5.252.191.0/24 | CIDR | 01-Jun-2023 |
Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/105.0.5195.102+Safari/537.36 | User Agent | 02-Jun-2023 |
dojustit[.]mooo[.]com | Domain | 02-Jun-2023 |
0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9 | SHA256 Hash | 01-Jun-2023 |
110e301d3b5019177728010202c8096824829c0b11bb0dc0bff55547ead18286 | SHA256 Hash | 01-Jun-2023 |
1826268249e1ea58275328102a5a8d158d36b4fd312009e4a2526f0bfbc30de2 | SHA256 Hash | 01-Jun-2023 |
2ccf7e42afd3f6bf845865c74b2e01e2046e541bb633d037b05bd1cdb296fa59 | SHA256 Hash | 01-Jun-2023 |
58ccfb603cdc4d305fddd52b84ad3f58ff554f1af4d7ef164007cb8438976166 | SHA256 Hash | 01-Jun-2023 |
98a30c7251cf622bd4abce92ab527c3f233b817a57519c2dd2bf8e3d3ccb7db8 | SHA256 Hash | 01-Jun-2023 |
a8f6c1ccba662a908ef7b0cb3cc59c2d1c9e2cbbe1866937da81c4c616e68986 | SHA256 Hash | 01-Jun-2023 |
b5ef11d04604c9145e4fe1bedaeb52f2c2345703d52115a5bf11ea56d7fb6b03 | SHA256 Hash | 01-Jun-2023 |
cec425b3383890b63f5022054c396f6d510fae436041add935cd6ce42033f621 | SHA256 Hash | 01-Jun-2023 |
ed0c3e75b7ac2587a5892ca951707b4e0dd9c8b18aaf8590c24720d73aa6b90c | SHA256 Hash | 01-Jun-2023 |
0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9 | SHA256 Hash | 01-Jun-2023 |
110e301d3b5019177728010202c8096824829c0b11bb0dc0bff55547ead18286 | SHA256 Hash | 01-Jun-2023 |
1826268249e1ea58275328102a5a8d158d36b4fd312009e4a2526f0bfbc30de2 | SHA256 Hash | 01-Jun-2023 |
2ccf7e42afd3f6bf845865c74b2e01e2046e541bb633d037b05bd1cdb296fa59 | SHA256 Hash | 01-Jun-2023 |
58ccfb603cdc4d305fddd52b84ad3f58ff554f1af4d7ef164007cb8438976166 | SHA256 Hash | 01-Jun-2023 |
98a30c7251cf622bd4abce92ab527c3f233b817a57519c2dd2bf8e3d3ccb7db8 | SHA256 Hash | 01-Jun-2023 |
a8f6c1ccba662a908ef7b0cb3cc59c2d1c9e2cbbe1866937da81c4c616e68986 | SHA256 Hash | 01-Jun-2023 |
b5ef11d04604c9145e4fe1bedaeb52f2c2345703d52115a5bf11ea56d7fb6b03 | SHA256 Hash | 01-Jun-2023 |
cec425b3383890b63f5022054c396f6d510fae436041add935cd6ce42033f621 | SHA256 Hash | 01-Jun-2023 |
ed0c3e75b7ac2587a5892ca951707b4e0dd9c8b18aaf8590c24720d73aa6b90c | SHA256 Hash | 01-Jun-2023 |