CVE-2023-36932

Vulnerability updated a month ago (2024-11-29T14:34:08.525Z)
Download STIX
Preview STIX
CVE-2023-36932 is a high-severity software vulnerability found in several versions of MOVEit Transfer, a widely used file transfer solution. This flaw exposes multiple SQL vulnerabilities that can potentially allow unauthorized users to disclose and modify database content. The affected versions include those prior to 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4). This vulnerability was discovered via the HackerOne platform. The exploitation of CVE-2023-36932 could enable an attacker to submit a specially crafted payload to a MOVEit Transfer application endpoint, resulting in the potential disclosure and alteration of MOVEit database content. As of the date of the advisory, there have been no known instances of this vulnerability being exploited in the wild. However, given its severity, users are strongly encouraged to apply patches as soon as possible. In addition to CVE-2023-36932, two other vulnerabilities were disclosed at the same time, one of which, tracked as CVE-2023-36934, is of critical severity and could allow unauthenticated attackers to gain unauthorized access to the MOVEit Transfer database. This issue was identified by a Trend Micro researcher through the Zero Day Initiative. Given the seriousness of these vulnerabilities, it is essential for all users of the affected MOVEit Transfer versions to implement the recommended patches immediately to protect their systems and data.
Description last updated: 2024-05-04T16:32:33.157Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Moveit
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.