CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
EPSS
Percentile
17.0%
In Progress MOVEit Transfer versions released before 2022.0.9 (14.0.9), 2022.1.10 (14.1.10), 2023.0.7 (15.0.7),Β a reflected cross-site scripting (XSS) vulnerability has been identified when MOVEit Gateway is used in conjunction with MOVEit Transfer.
An attacker could craft a malicious payload targeting the system which comprises a MOVEit Gateway and MOVEit Transfer deployment. If a MOVEit user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victimβs browser.
Vendor | Product | Version | CPE |
---|---|---|---|
progress | moveit_transfer | * | cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:* |
[
{
"defaultStatus": "affected",
"modules": [
"MOVEit Transfer Web Interface",
"MOVEit Gateway"
],
"product": "MOVEit Transfer",
"vendor": "Progress Software Corporation",
"versions": [
{
"lessThan": "2023.1.1(15.1.1)",
"status": "unaffected",
"version": "2023.1.0(15.1.0)",
"versionType": "semver"
},
{
"lessThan": "2023.0.7 (15.0.7)",
"status": "affected",
"version": "2023.0.0 (15.0.0)",
"versionType": "semver"
},
{
"lessThan": "2022.1.10 (14.1.10)",
"status": "affected",
"version": "2022.1.0 (14.1.0)",
"versionType": "semver"
},
{
"lessThan": "2022.0.9 (14.0.9)",
"status": "affected",
"version": "2022.0.0 (14.0.0)",
"versionType": "semver"
}
]
}
]