In Progress MOVEit Transfer before 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS).
References
Link | Resource |
---|---|
https://community.progress.com/s/article/MOVEit-Transfer-Vulnerability-Nov-2020 | Vendor Advisory |
https://labs.secforce.com/posts/progress-moveit-transfer-2020.1-stored-xss-cve-2020-28647/ | Exploit Third Party Advisory |
https://www.progress.com/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-11-17T13:08:50
Updated: 2020-12-18T20:57:39
Reserved: 2020-11-16T00:00:00
Link: CVE-2020-28647
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-11-17T14:15:11.417
Modified: 2022-10-21T19:32:04.167
Link: CVE-2020-28647
JSON object: View
Redhat Information
No data.
CWE