Vulnerability Description
In Progress MOVEit Transfer versions released before 2022.0.9 (14.0.9), 2022.1.10 (14.1.10), 2023.0.7 (15.0.7), a reflected cross-site scripting (XSS) vulnerability has been identified when MOVEit Gateway is used in conjunction with MOVEit Transfer. An attacker could craft a malicious payload targeting the system which comprises a MOVEit Gateway and MOVEit Transfer deployment. If a MOVEit user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victim’s browser.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Progress | Moveit Transfer | <= 2021.1.0 |
Related Weaknesses (CWE)
References
- https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-November-2Release NotesVendor Advisory
- https://www.progress.com/moveitProduct
- https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-November-2Release NotesVendor Advisory
- https://www.progress.com/moveitProduct
FAQ
What is CVE-2023-6217?
CVE-2023-6217 is a vulnerability with a CVSS score of 7.1 (HIGH). In Progress MOVEit Transfer versions released before 2022.0.9 (14.0.9), 2022.1.10 (14.1.10), 2023.0.7 (15.0.7), a reflected cross-site scripting (XSS) vulnerability has been identified when MOVEit Ga...
How severe is CVE-2023-6217?
CVE-2023-6217 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6217?
Check the references section above for vendor advisories and patch information. Affected products include: Progress Moveit Transfer.