In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, a REST API endpoint failed to adequately sanitize malicious input, which could allow an authenticated attacker to execute arbitrary code in a victim's browser, aka XSS.
References
Link | Resource |
---|---|
https://community.ipswitch.com/s/article/MOVEit-Transfer-Security-Vulnerabilities-Feb-2020 | Patch Vendor Advisory |
https://docs.ipswitch.com/MOVEit/Transfer2019_1/ReleaseNotes/en/index.htm#49443.htm | Release Notes Vendor Advisory |
https://docs.ipswitch.com/MOVEit/Transfer2019_2/ReleaseNotes/en/index.htm#49677.htm | Release Notes Vendor Advisory |
https://status.moveitcloud.com/ | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-14T18:02:08
Updated: 2020-02-14T18:02:08
Reserved: 2020-02-04T00:00:00
Link: CVE-2020-8612
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-14T19:15:10.590
Modified: 2020-02-20T14:58:20.547
Link: CVE-2020-8612
JSON object: View
Redhat Information
No data.
CWE