9.8
CVSSv3

CVE-2023-34362

Published: 02/06/2023 Updated: 23/06/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Progress MOVEit Transfer prior to 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated malicious user to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

progress moveit cloud

progress moveit transfer

Vendor Advisories

PAN-SA-2023-0003 Informational Bulletin: Impact of MOVEit Vulnerabilities (CVE-2023-34362, CVE-2023-35036) ...

Exploits

This Metasploit module exploits an SQL injection vulnerability in the MOVEit Transfer web application that allows an unauthenticated attacker to gain access to MOVEit Transfer's database Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker can leverage an information leak be able to upload a NET des ...

Github Repositories

CVE-2023-34362-IOCs. More information on Deep Instinct's blog site.

MOVEit CVE-2023-34362 IOCs More information on Deep Instinct's blog site Disclaimer The code provided is offered as-is and is intended for educational or informational purposes only The user assumes all responsibility for the use of this code and any consequences that may arise from its use The creator of this code and its affiliates cannot be held liable for any damage

Scraper for daily renewal of the Known Exploited Vulnerabilities Catalog by CISA

Daily scaraping of Known Exploited Vulnerabilities @ CISA Mirroring wwwcisagov/sites/default/files/feeds/known_exploited_vulnerabilitiesjsondaily and stores it on GitHub, since CISA restricts access and applys rate limites This simply helps to keep everything at one place, and my automation up and running How it works The magic is done with the help of this GitHub

A National Vulnerability Database (NVD) API query tool

nvdsearch - v10 - @h0useh3ad A National Vulnerability Database (NVD) API query tool Install Clone from repo $ go mod init nvdsearch $ go mod tidy $ go build Tested with Go version 1191+ Usage nvdsearch has multiple options: cpelookup, cveid, product, cpe $ /nvdsearch -h _ _

CVE-2023-34362: MOVEit Transfer Unauthenticated RCE

CVE-2023-34362: MOVEit Transfer Unauthenticated RCE For a full technical description of the vulnerability and exploitation, please read our AttackerKB Analysis Usage ruby CVE-2023-34362rb <TARGET_IP> Note: The deserialization gadget is configured to spawn 'notepadexe' Example >ruby poc-cve-2023-34362rb

Exercise for searching CVE's in Metasploit

How to search for a CVE in metasploit Use the following steps to search for a CVE manually, using msfconsole Building & Running a metasploit container To do this we will use the debian-msf-local docker container image Steps for Running: run the build script - /buildsh run the container execute script /runsh A Dockerfile and build script (buildsh) has been incl

CVE-2023-34362 POCs for credential dumping, reverse shells, and playing music by abusing a command injection, CVE-2023-26067, affecting Lexmark Printers Technical Analysis A technical root cause analysis of the vulnerability can be found on our blog: wwwhorizon3ai/lexmark-command-injection-vulnerability-zdi-can-19470-pwn2own-toronto-2022 Summary This POC abuses a com

This shellscript given the OrgKey 0 will parse the header of the base64 artifacts found in MOVEit Logs and decrypt the Serialized object used a payload

moveit-payload-decrypt-CVE-2023-34362 This shellscript given the OrgKey 0 will parse the header of the base64 artifacts found in MOVEit Logs and decrypt the Serialized object used a payload

POC for CVE-2023-34362 affecting MOVEit Transfer

CVE-2023-34362 POC for CVE-2023-34362 affecting MOVEit Transfer Technical Analysis A technical root cause analysis of the vulnerability can be found on the blog: Summary This POC abuses an SQL injection to obtain a sysadmin API access token and then uses that access to abuse a deserialization call to obtain remote code execution This POC needs to reach out to an Identity P

Repository with everything I have tracking the impact of MOVEit CVE-2023-34362

MOVEit-CVE-2023-34362 Repository with everything I have tracking the impact of MOVEit CVE-2023-34362 Includes possibly affected organizations and domains utilizing SFTP header and cookie discovery methods I've also built a news ticker which tracks new stories about MOVEit, available at firehosekenbucklercom/moveit

an exploit of POC for CVE-2023-34362 affecting MOVEit Transfer

MOVEit Exploit an exploit of POC for CVE-2023-34362 affecting MOVEit Transfer Note this project is done Our instagram page Our youtube chanel Our twitter page CVE-2023-34362 POC for CVE-2023-34362 affecting MOVEit Transfer Disclaimer This software has been created purely for the purposes of academic researc

MOVEit CVE-2023-34362

CVE-2023-34362 POC for CVE-2023-34362 affecting MOVEit Transfer Technical Analysis A technical root cause analysis of the vulnerability can be found on our blog: wwwhorizon3ai/moveit-transfer-cve-2023-34362-deep-dive-and-indicators-of-compromise/ Summary This POC abuses an SQL injection to obtain a sysadmin API access token and then use that access to abuse a deserial

Information about Progress MoveIT CVE

Progress MOVEit vulnerability (CVE-2023-34362) This repo contains operational information regarding Progress MoveIT Transfer vulnerability For more information see: NCSC-NL advisory (NL) Progress MOVEit Transfer Critical Vulnerability (May 2023) TrustedSec: Critical Vulnerability in Progress Moveit Transfer: Technical Analysis and Recommendations Huntress Labs: MOVEit Transfe

Lexmark CVE-2023-26067

CVE-2023-34362 POCs for credential dumping, reverse shells, and playing music by abusing a command injection, CVE-2023-26067, affecting Lexmark Printers Technical Analysis A technical root cause analysis of the vulnerability can be found on our blog: wwwhorizon3ai/lexmark-command-injection-vulnerability-zdi-can-19470-pwn2own-toronto-2022 Summary This POC abuses a com

Quick OSINT checks for IPs and Domains during triage and investigations.

Python Hunt Quick OSINT checks for IPs and Domains during triage and investigations About This script queries APIs for various freely-available intelligence platforms in order to gain important context and reputation data for IP addresses and/or domains Platforms Used WHOIS VirusTotal AlienVault OTX BGPView IBM X-Force Shodan ipinfoio API Keys Required for: VirusTotal I

Cybersecurity Breaches for Payment Industry (Billtrust & Fiserv)

Lesson Learned from �Security Breaches Cybersecurity Breaches for Payment Industry (Billtrust & Fiserv) Rapid7's full technical analysis of the exploit chain for CVE-2023-34362 attackerkbcom/topics/mXmV0YpC3W/cve-2023-34362/rapid7-analysis?referrer=etrblog A strong IOC may be present in the log file C:\MOVEitTransfer\Logs\DMZ_WebApilog Ref 1 MOVEit

Description of project: Understanding and analyzing a recent Cyber Security breach The goal is to find a solution through a tool, protocol/policy, and to discuss vulnerability protection behaviors that can be demonstrated to prevent these attacks The breach of choice: The type of breach I chose was SQL injection and this breach occurred on a common managed file transfer softw

A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project)

MOVEit-CVE-2023-34362 A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project) Video Link : youtube/EsyWXNcmNQY

A curated list of my GitHub stars!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents Adblock Filter List Assembly Awk Batchfile Brainfuck C C# C++ CMake CSS Clojure Common Lisp Crystal Cython Dart Dhall Dockerfile Earthly Elixir Emacs Lisp Erlang Fennel GDScript Go HTML Handlebars Haskell Inno Setup Java JavaScript Jupyter Notebook Kotlin LLVM Lua M4 MDX Makefile NCL Nim Nix Nun

Recent Articles

MOVEit Vulnerabilities: What You Need to Know
Symantec Threat Intelligence Blog • Threat Hunter Team • 12 Jun 2024

Symantec products guard against exploitation of vulnerabilities that are being actively exploited by cyber-crime actors.

Posted: 12 Jun, 20233 Min ReadThreat Intelligence SubscribeFollowtwitterlinkedinMOVEit Vulnerabilities: What You Need to KnowSymantec products guard against exploitation of vulnerabilities that are being actively exploited by cyber-crime actors.Extortion actors have been actively exploiting a recently patched vulnerability in MOVEit Transfer, a file-transfer application that is widely used to transmit information between organizations. The nature of the ...

IT threat evolution in Q2 2023. Non-mobile statistics
Securelist • AMR • 30 Aug 2023

IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q2 2023: Kaspersky solutions blocked 801,934,281 attacks from online resources across the globe. A total of 209,716,810 unique links were detected by Web ...

Clop ransomware crew sets June extortion deadline for MOVEit victims
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Plus: The Feds weigh in with advice, details

Clop, the ransomware crew that has exploited the MOVEit vulnerability extensively to steal corporate data, has given victims a June 14 deadline to pay up or the purloined information will be leaked. Organizations including British Airways, the BBC, and the Boots pharmacy chain in the UK have had their employees' records stolen by the Russian gang via the software flaw. It's feared thousands if not tens of thousands of workers have had their personal info swiped. Crucially, to steal the data, Clo...

Third MOVEit bug fixed a day after PoC exploit made public
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Millions of people's personal info swiped, Clop leaks begin with 'Shell's stolen data'

Progress Software on Friday issued a fix for a third critical bug in its MOVEit file transfer suite, a vulnerability that had just been disclosed the day earlier. Details of the latest vulnerability, tracked as CVE-2023-35708, were made public Thursday; proof-of-concept (PoC) exploit for the flaw, now fixed today, also emerged on Thursday. A researcher who goes by the handle MCKSys Argentina confirmed to The Register that a June 16 MOVEit patch for CVE-2023-35708 mitigated the researcher's PoC e...

British Airways, Boots, BBC payroll data stolen in MOVEit supply-chain attack
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Microsoft blames Clop ransomware crew for theft of staff info

British Airways, the BBC, and UK pharmacy chain Boots are among the companies whose data has been compromised after miscreants exploited a critical vulnerability in deployments of the MOVEit document-transfer app. Microsoft reckons the Clop ransomware crew stole the information. British Airways, the BBC, and Boots were not hit directly. Instead, payroll services provider Zellis on Monday admitted its MOVEit installation had been exploited, and as a result "a small number of our customers" – in...

MOVEit body count closes in on 400 orgs, 20M+ individuals
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources 'One of the most significant hacks of recent years,' we're told

The number of victims and costs tied to the MOVEit file transfer hack continues to climb as the fallout from the massive supply chain attack enters week seven. In late May, Russian ransomware gang Clop exploited a security hole in Progress Software's MOVEit product suite to steal documents from vulnerable networks. As of today, the number of affected organizations is closing is on 400 and include some really big names: the US Department of Energy and other federal agencies as well as huge corpor...

UK telco watchdog Ofcom, Minnesota Dept of Ed named as latest MOVEit victims
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources As another CVE is assigned

Two more organizations hit in the mass exploitation of the MOVEit file-transfer tool have been named – the Minnesota Department of Education in the US, and the UK's telco regulator Ofcom – just days after security researchers discovered additional flaws in Progress Software's buggy suite. Ofcom disclosed this week it is among the businesses and public bodies that have had their internal data stolen by crooks exploiting a MOVEit flaw. Russia's Clop ransomware crew has since claimed it has bee...

MOVEit breach delivers bundle of 3.4 million baby records
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Progress Software vulnerability ID'd in enormous burglary at Ontario's BORN

Canada's Better Outcomes Registry & Network (BORN) fears a MOVEit breach allowed cybercriminals to copy 3.4 million people's childcare health records dating back more than a decade. BORN, which collates and uses information on "pregnancy, birth, the newborn period and childhood to improve care," says it became aware of the incident on May 31 and notified relevant authorities, including the Ontario Provincial Police and the province's Information and Privacy Commissioner. "During the breach, ...

Healthcare files of 8M-plus people fall into hands of Clop via MOVEit mega-bug
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Maximus plus Deloitte and Chuck E. Cheese join 500+ victim orgs

Accounting giant Deloitte, pizza and birthday party chain Chuck E. Cheese, government contractor Maximus, and the Hallmark Channel are among the latest victims that the Russian ransomware crew Clop claims to have compromised via the MOVEit vulnerability. Deloitte confirmed an intrusion but declined to answer The Register's questions about how much and what type of data was accessed in the incident. The biz now joins PwC and Ernst and Young – all three big accounting firms – among the hundred...

Rust can help make software secure – but it's no cure-all
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Security is a process, not a product. Nor a language

Memory-safety flaws represent the majority of high-severity problems for Google and Microsoft, but they're not necessarily associated with the majority of vulnerabilities that actually get exploited. So while coding with Rust can help reduce memory safety vulnerabilities, it won't fix everything. Security biz Horizon3.ai has analyzed CISA's Known Exploited Vulnerabilities in 2023 and found, as chief attack engineer Zach Hanley put it, that "Rust won’t save us, but it will help us." We feel thi...