Progress MOVEit Transfer < 2023.0.1 — RCE
A SQL injection in MOVEit Transfer's web application allows unauthenticated attackers to access and download stored files. Apply Progress's emergency patch immediately — Cl0p ransomware exploited this zero-day to steal data from thousands of organisations.
An unauthenticated attacker can access and download all files stored in the MOVEit Transfer system, which often includes sensitive documents, PII, financial data, and HR records transferred by enterprise customers. The web shell enables persistent access for ongoing data theft. Hundreds of organisations had data exfiltrated and then received ransom demands.
MOVEit Transfer's web application contains a SQL injection vulnerability in the SFTP or HTTP interface. An unauthenticated attacker can send a crafted HTTP request to inject SQL commands, which allows them to enumerate the database, retrieve stored file contents, and install a web shell for persistent access.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Affected OS versions
The Cl0p ransomware group exploited CVE-2023-34362 as a zero-day in late May 2023, having likely been active since 2021 with similar vulnerabilities. Over 2,500 organisations across banking, government, healthcare, and education had data exfiltrated. Notable victims included the US Department of Energy, British Airways, Shell, and dozens of US state and local governments. This became one of the largest mass-exploitation events of 2023.
Manual remediation steps
⏱ 1 hour including compromise check and patchCheck for Web Shell / Compromise Indicators FIRST
# Search for recently created ASPX files in the MOVEit web root
$movedRoot = "C:\MOVEitTransfer\wwwroot"
Get-ChildItem $movedRoot -Recurse -Filter "*.aspx" |
Where-Object { $_.CreationTime -gt "2023-05-01" } |
Select-Object FullName, CreationTime, LastWriteTime
# Check IIS logs for suspicious activity
Get-ChildItem "C:\inetpub\logs\LogFiles" -Recurse -Filter "*.log" |
Select-String -Pattern "guestaccess.aspx|human2.aspx|.cmdline" |
Select-Object Line
If Compromised
Apply the Emergency Patch
Verify
# Check MOVEit Transfer version in the registry or web UI
Get-ItemProperty "HKLM:\SOFTWARE\MOVEit Transfer" -ErrorAction SilentlyContinue
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References