DETECTION OVERVIEW
Risk Factors
This vulnerability is well known and easy to exploit. Many organizations, from universities to enterprises, have been affected. Advanced persistent threat (APT) groups have exploited this vulnerability to launch additional attacks on networks.
Kill Chain
Risk Score
87
Organizations can securely transfer files between businesses with managed file transfer (MFT) solutions. The Progress Software MFT solution, MOVEit Transfer, includes an SQL injection vulnerability in the MOVEit web application. To exploit the vulnerability, an attacker sends HTTP requests with malicious SQL statements in HTTP headers. The SQL injection attack can be chained together with other vulnerabilities to ultimately perform remote code execution (RCE). For example, initial SQL injection attempts are designed to allow remote access to a restricted REST API and create an attacker-controlled privileged user. With this access, the attacker can upload a malicious payload and run the malicious payload on the victim device.
Apply relevant patches to affected software versions