Progress quietly fixes MOVEit auth bypass flaws (CVE-2024-5805, CVE-2024-5806)
Progress Software has patched one critical (CVE-2024-5805) and one high-risk (CVE-2024-5806) vulnerability in MOVEit, its widely used managed file transfer (MFT) software product.
According to WatchTowr Labs researchers, the company has been privately instructing users to implement the hotfixes before they go public with the information.
About the vulnerabilities
CVE-2024-5805 is an improper authentication vulnerability in MOVEit Gateway, which serves as a proxy so that MOVEit Transfer – the actual managed file transfer software – can receive inbound connections when deployed behind a firewall.
The vulnerability affects the solution’s SFTP module and allows attackers to bypass authentication. It affects MOVEit Gateway v2024.0.0 and has been fixed in v2024.0.1 earlier this month.
“Upgrading to a patched release, using the full installer, is the only way to remediate this issue. There will be an outage to the system while the upgrade is running,” Progress Software warned.
The same warning has been given to those that will upgrade their MOVEit Transfer installations to fix CVE-2024-5806, a less critical (but still serious) improper authentication flaw affecting the solution’s SFTP module. CVE-2024-5806 can lead to authentication bypass “in limited scenarios,” the company said.
That vulnerability affects MOVEit Transfer versions:
- From v2023.0.0 before v2023.0.11
- From v2023.1.0 before v2023.1.6
- From v2024.0.0 before v2024.0.2.
Customers with on-premises installations are advised to upgrade to one of the fixed versions.
While CVE-2024-5805 did not affect MOVEit Cloud (because it does not use MOVEit Gateway), CVE-2024-5806 affected customers using the MOVEit Cloud environment, but has been since patched, the company noted.
CVE-2024-5805 was privately disclosed by one Max Hase, but it is still unknown how and by whom CVE-2024-5806 was discovered. It might just be that the disclosure of the former spurred the company to check whether MOVEit Transfer had a similar one, and they found the latter.
A PoC for CVE-2024-5806
WatchTowr Labs researchers have been privately alerted to the existence of a flaw in Progress MOVEit Transfer that could lead to an authentication bypass, as well as the fact that Progress has been sending emails to customers urging them to patch and is supposed to reveal its existence on Tuesday, June 25, 2024.
Progress has released the associated security advisories and WatchTowr researchers have published an extremely detailed account of their search for the flaw and how they managed to exploit it, and a PoC exploit for CVE-2024-5806.
“The vulnerability arises from the interplay between MOVEit and IPWorks SSH, and a failure to handle an error condition,” they found.
They also pointed out that while it’s a pretty bad attack, attackers must have knowledge of a valid users on the vulnerable system.
“Although this is a low bar for attackers to overcome, it will help limit the progress of automated attacks,” they explained, and noted that IP-based access restrictions may reduce the risk of exploitation. They also shared specific entries in the solution’s logs that can server as an indicator of exploitation.
“Progress has been contacting customers for weeks/months to patch this issue – and have made good-faith efforts to ensure this has been done. We do not expect anyone to still be vulnerable due to the embargo, and the efforts taken proactively by Progress to ensure customers deployed patches,” they concluded.
MOVEit installations were massively exploited last year by the Cl0p ransomware gang via a zero-day vulnerability.
source: HelpNetSecurity
Free security scan for your website
Top News:
Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)
November 18, 2024CWE top 25 most dangerous software weaknesses
November 21, 2024Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
November 21, 2024Hackers now use AppDomain Injection to drop CobaltStrike beacons
August 24, 2024