CVE-2023-34362

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL...

Basic Information

CVE State
PUBLISHED
Reserved Date
June 02, 2023
Published Date
June 02, 2023
Last Updated
August 02, 2024
Vendor
n/a
Product
n/a
Description
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2023-06-02 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2023-07-18 15:58:00 UTC) Source
Used in Malware
Yes (added 2023-06-02 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-06-02 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

moveit_cve_2023_34362

Type: metasploit • Created: Unknown

Metasploit module for CVE-2023-34362

toorandom/moveit-payload-decrypt-CVE-2023-34362

Type: github • Created: 2023-07-18 15:58:00 UTC • Stars: 1

This shellscript given the OrgKey 0 will parse the header of the base64 artifacts found in MOVEit Logs and decrypt the Serialized object used a payload

Malwareman007/CVE-2023-34362

Type: github • Created: 2023-07-09 18:44:22 UTC • Stars: 10

POC for CVE-2023-34362 affecting MOVEit Transfer

kenbuckler/MOVEit-CVE-2023-34362

Type: github • Created: 2023-06-16 00:39:37 UTC • Stars: 5

Repository with everything I have tracking the impact of MOVEit CVE-2023-34362

sfewer-r7/CVE-2023-34362

Type: github • Created: 2023-06-12 12:56:12 UTC • Stars: 64

CVE-2023-34362: MOVEit Transfer Unauthenticated RCE

horizon3ai/CVE-2023-34362

Type: github • Created: 2023-06-09 19:07:32 UTC • Stars: 140

MOVEit CVE-2023-34362

deepinstinct/MOVEit_CVE-2023-34362_IOCs

Type: github • Created: 2023-06-06 15:33:49 UTC • Stars: 2

CVE-2023-34362-IOCs. More information on Deep Instinct's blog site.