3.5
CVSSv2

CVE-2020-28647

Published: 17/11/2020 Updated: 21/10/2022
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

In Progress MOVEit Transfer prior to 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

progress moveit transfer

Github Repositories

MOVEit Transfer 2020 web application Stored Cross-Site Scripting (XSS)

Progress MOVEit Transfer < 20201 Stored XSS (CVE-2020-28647) During a recent web application test engagement one of the applications in scope was a MOVEit Transfer 2020 web application While performing the assessment a Stored Cross-Site Scripting (XSS) vulnerability was identified This blog post will go though the discovery and exploitation of such vulnerability to ga

MOVEit Transfer 2020 web application Stored Cross-Site Scripting (XSS)

Progress MOVEit Transfer < 20201 Stored XSS (CVE-2020-28647) During a recent web application test engagement one of the applications in scope was a MOVEit Transfer 2020 web application While performing the assessment a Stored Cross-Site Scripting (XSS) vulnerability was identified This blog post will go though the discovery and exploitation of such vulnerability to ga