Vulnerability Name:

CVE-2019-18464 (CCN-170748)

Assigned:2019-10-31
Published:2019-10-31
Updated:2019-11-06
Summary:In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-89
Vulnerability Consequences:Data Manipulation
References:Source: MITRE
Type: CNA
CVE-2019-18464

Source: CCN
Type: ipswitch Web site
MOVEit Transfer SQL Injection Vulnerability

Source: CONFIRM
Type: Patch, Vendor Advisory
https://community.ipswitch.com/s/article/SQL-Injection-Vulnerability-2

Source: CONFIRM
Type: Release Notes, Vendor Advisory
https://docs.ipswitch.com/MOVEit/Transfer2018SP2/ReleaseNotes/en/index.htm#46490.htm

Source: CONFIRM
Type: Release Notes, Vendor Advisory
https://docs.ipswitch.com/MOVEit/Transfer2019/ReleaseNotes/en/index.htm#48648.htm

Source: CONFIRM
Type: Release Notes, Vendor Advisory
https://docs.ipswitch.com/MOVEit/Transfer2019_1/ReleaseNotes/en/index.htm#49443.htm

Source: XF
Type: UNKNOWN
progress-cve201918464-sql-injection(170748)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ipswitch:moveit_transfer:*:*:*:*:*:*:*:* (Version >= 10.2.0 and < 10.2.6)
  • OR cpe:/a:ipswitch:moveit_transfer:*:*:*:*:*:*:*:* (Version >= 11.0 and < 11.0.4)
  • OR cpe:/a:ipswitch:moveit_transfer:*:*:*:*:*:*:*:* (Version >= 11.1 and < 11.1.3)

  • * Denotes that component is vulnerable
    BACK
    ipswitch moveit transfer *
    ipswitch moveit transfer *
    ipswitch moveit transfer *