Breach, Vulnerability Management, Incident Response
Progress Software rushes to patch another MOVEit SQL vulnerability

Progress Software issued a second patch last Friday to address a number of additional SQL injection vulnerabilities, and found itself having to do the same again on Thursday. (Image Credit: baramee2554 via Getty Images)
Progress Software rushed to deploy a fresh patch to MOVEit Transfer users overnight Thursday following the discovery of a new SQL injection vulnerability affecting the file transfer solution.It was the second MOVEit Transfer patch issued within a week that also saw the start of extortion attempts against some victims of last month’s zero-day attacks targeting a large number of MOVEit users.The Clop ransomware group claimed responsibility for the May attacks, saying it had exfiltrated data from “hundreds” of organizations by exploiting a now-patched SQL injection vulnerability, CVE-2023-34362.Progress Software issued a second patch last Friday to address a number of additional SQL injection vulnerabilities (CVE-2023-35036), and found itself having to do the same again on Thursday. “We are currently rolling out patches for MOVEit Transfer,” Progress said in an update on its website on Thursday night.Earlier in the day it disabled HTTPs traffic on the cloud version of its solution, MOVEit Cloud, which was also impacted by the new vulnerability.“We took HTTPs traffic down for MOVEit Cloud in light of the newly published vulnerability and asked all MOVEit Transfer customers to take down their HTTP and HTTPs traffic to safeguard their environments while a patch was created and tested,” the update said.Progress Software also “strongly” recommended customers modified their firewall rules to block HTTP and HTTPs traffic to MOVEit Transfer on ports 80 and 443.While disabling HTTP and HTTPs affected access to MOVEit Transfer’s web user interface, some automation tasks, APIs and the application’s Outlook add-in, Progress Software said SFTP and FTP/s protocols would continue to work as normal.“As a workaround, administrators will still be able to access MOVEit Transfer by using a remote desktop to access the Windows machine and then accessing https://localhost/,” its update said.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds