- Description
- In Progress MOVEit Transfer versions released before 2022.0.9 (14.0.9), 2022.1.10 (14.1.10), 2023.0.7 (15.0.7), a reflected cross-site scripting (XSS) vulnerability has been identified when MOVEit Gateway is used in conjunction with MOVEit Transfer. An attacker could craft a malicious payload targeting the system which comprises a MOVEit Gateway and MOVEit Transfer deployment. If a MOVEit user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victim’s browser.
- Source
- security@progress.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9A99606D-C2F1-40F0-B682-8AF3A1214ED7",
"versionEndIncluding": "2021.1.0"
},
{
"criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6985BD08-92E5-48EA-BB76-B85186F067EA",
"versionEndExcluding": "2022.0.9",
"versionStartIncluding": "2022.0.0"
},
{
"criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7753AA60-D5C5-47A7-AE71-0ED05DE24930",
"versionEndExcluding": "2022.1.10",
"versionStartIncluding": "2022.1.0"
},
{
"criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A01A6CCA-73BC-45BE-858A-24EEA00B81EC",
"versionEndExcluding": "2023.0.7",
"versionStartIncluding": "2023.0.0"
},
{
"criteria": "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7B7FB41C-AC16-4A5F-9C0D-CEF3E87084CF",
"versionEndExcluding": "2023.1.2",
"versionStartIncluding": "2023.1.0"
}
],
"operator": "OR"
}
]
}
]