• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
another critical unauthenticated sqli flaw discovered in moveit transfer software

Another Critical Unauthenticated SQLi Flaw Discovered in MOVEit Transfer Software

You are here: Home / General Cyber Security News / Another Critical Unauthenticated SQLi Flaw Discovered in MOVEit Transfer Software
July 7, 2023

Development Application has announced the discovery and patching of a critical SQL injection vulnerability in MOVEit Transfer, well-liked software program utilized for protected file transfer. In addition, Progress Program has patched two other high-severity vulnerabilities.

The discovered SQL injection vulnerability, tagged as CVE-2023-36934, could most likely let unauthenticated attackers to acquire unauthorized accessibility to the MOVEit Transfer databases.

SQL injection vulnerabilities are a perfectly-identified and perilous security flaw that permits attackers to manipulate databases and run any code they want. Attackers can send out specially built payloads to specified endpoints of the influenced application, which could adjust or expose delicate info in the databases.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The explanation CVE-2023-36934 is so critical is that it can be exploited without having having to be logged in. This means that even attackers without valid qualifications can perhaps exploit the vulnerability. Having said that, as of now, there have been no reports of this individual vulnerability remaining actively applied by attackers.

This discovery will come just after a sequence of modern cyberattacks that utilised a various SQL injection vulnerability (CVE-2023-34362) to focus on MOVEit Transfer with Clop ransomware. These attacks resulted in details theft and income extortion from impacted companies.

This hottest security update from Progress Program also addresses two other higher-severity vulnerabilities: CVE-2023-36932 and CVE-2023-36933.

CVE-2023-36932 is a SQL injection flaw that can be exploited by attackers who are logged in to attain unauthorized accessibility to the MOVEit Transfer databases. CVE-2023-36933, on the other hand, is a vulnerability that allows attackers to unexpectedly shut down the MOVEit Transfer application.

Future WEBINAR🔐 Privileged Accessibility Administration: Learn How to Conquer Important Issues

Find different ways to conquer Privileged Account Administration (PAM) problems and stage up your privileged accessibility security system.

Reserve Your Spot

Researchers from HackerOne and Trend Micro’s Zero Working day Initiative responsibly documented Progress Computer software about these vulnerabilities.

These vulnerabilities influence numerous MOVEit Transfer versions, which includes 12.1.10 and past variations, 13..8 and earlier, 13.1.6 and before, 14..6 and more mature, 14.1.7 and more mature, and 15..3 and previously.

Progress Software program has built the required updates available for all major MOVEit Transfer versions. Consumers are strongly encouraged to update to the most current edition of MOVEit Transfer to decrease the hazards posed by these vulnerabilities.

Observed this report appealing? Abide by us on Twitter  and LinkedIn to examine more special material we put up.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «mastodon social network patches critical flaws allowing server takeover Mastodon Social Network Patches Critical Flaws Allowing Server Takeover
Next Post: Vishing Goes High-Tech: New ‘Letscall’ Malware Employs Voice Traffic Routing vishing goes high tech: new 'letscall' malware employs voice traffic routing»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.