CVE-2020-8611
Summary
| CVE | CVE-2020-8611 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-14 18:15:00 UTC |
| Updated | 2020-02-19 21:21:00 UTC |
| Description | In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, multiple SQL Injection vulnerabilities have been found in the REST API that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database via the REST API. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or destroy database elements. |
Risk And Classification
Problem Types: CWE-89
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Progess | Moveit Transfer | All | All | All | All |
| Application | Progess | Moveit Transfer | All | All | All | All |
| Application | Progress | Moveit Transfer | All | All | All | All |
| Application | Progress | Moveit Transfer | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Ipswitch MOVEit Cloud Status | CONFIRM | status.moveitcloud.com | Product |
| MOVEit Transfer 2019.2 Release Notes | CONFIRM | docs.ipswitch.com | Release Notes, Vendor Advisory |
| Progress Customer Community | MISC | community.ipswitch.com | Vendor Advisory |
| MOVEit Transfer 2019.1 Release Notes | CONFIRM | docs.ipswitch.com | Release Notes, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.