Vulnerability Description
In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4), multiple SQL injection vulnerabilities have been identified in the MOVEit Transfer web application that could allow an authenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Progress | Moveit Transfer | < 2020.1.11 |
Related Weaknesses (CWE)
References
- https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-JulRelease NotesVendor Advisory
- https://www.progress.com/moveitProduct
- https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-JulRelease NotesVendor Advisory
- https://www.progress.com/moveitProduct
FAQ
What is CVE-2023-36932?
CVE-2023-36932 is a vulnerability with a CVSS score of 8.1 (HIGH). In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4), multiple SQL injection vulnerabilities have b...
How severe is CVE-2023-36932?
CVE-2023-36932 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36932?
Check the references section above for vendor advisories and patch information. Affected products include: Progress Moveit Transfer.