Progress Software program Releases Pressing Patches to Repair WS_FTP Server Vulnerabilities – Supply: heimdalsecurity.com

Progress Software program, the developer behind the MOVEit Transfer file-sharing platform lately issued a patch for a most severity vulnerability in its WS_FTP Server software program and advises customers to deploy the patch rapidly.

Particulars In regards to the Vulnerabilities Found

In response to an advisory revealed on Wednesday, the corporate disclosed a number of vulnerabilities impacting the software program’s supervisor interface and Advert hoc Switch Module.

Out of all the safety flaws patched, two of them stand out in particular, as they had been rated as vital: CVE-2023-40044 and CVE-2023-42657.

CVE-2023-40044 has a CVSS rating of 10.00, and if exploited it permits unauthenticated attackers to execute distant instructions after profitable exploitation of a .NET deserialization vulnerability within the Advert Hoc Switch module.

The opposite vital vulnerability, CVE-2023-42657, is a listing traversal vulnerability that allows attackers to carry out file operations exterior the licensed WS_FTP folder path.

Attackers might additionally escape the context of the WS_FTP Server file construction and carry out the identical degree of operations (delete, rename, rmdir, mkdir) on file and folder areas on the underlying working system,

Progress Software program (Source)

Attackers can benefit from each vulnerabilities in low-complexity assaults that don’t necessitate consumer participation, in keeping with the corporate’s CVSS:3.1 evaluation for them.

The next are the remaining points that have an effect on WS_FTP Server variations prior to eight.8.2:

  • CVE-2023-40045 (CVSS rating: 8.3) – A mirrored cross-site scripting (XSS) vulnerability within the WS_FTP Server’s Advert Hoc Switch module that may very well be exploited to execute arbitrary JavaScript throughout the context of the sufferer’s browser.
  • CVE-2023-40047 (CVSS rating: 8.3) – A saved cross-site scripting (XSS) vulnerability exists within the WS_FTP Server’s Administration module that may very well be exploited by an attacker with admin privileges to import an SSL certificates with malicious attributes containing XSS payloads that would then be triggered in sufferer’s browser.
  • CVE-2023-40046 (CVSS rating: 8.2) – An SQL injection vulnerability within the WS_FTP Server supervisor interface that may very well be exploited to deduce data saved within the database and execute SQL statements that alter or delete its contents.
  • CVE-2023-40048 (CVSS rating: 6.8) – A cross-site request forgery (CSRF) vulnerability within the WS_FTP Server Supervisor interface.
  • CVE-2022-27665 (CVSS rating: 6.1) – A mirrored cross-site scripting (XSS) vulnerability in Progress Ipswitch WS_FTP Server 8.6.0 that may result in execution of malicious code and instructions on the shopper.
  • CVE-2023-40049 (CVSS rating: 5.3) – An authentication bypass vulnerability that permits customers to enumerate information underneath the ‘WebServiceHost’ listing itemizing.

Progress strongly recommends its WS_FTP customers to patch them. They’re additionally recommending upgrading to the newest model which is 8.8.2

Upgrading to a patched launch, utilizing the total installer, is the one option to remediate this situation. There might be an outage to the system whereas the improve is working.

Progress Software program (Source)

The corporate additionally shared data on the way to disable or take away the weak WS_FTP Server Advert Hoc Switch Module if it’s not getting used.

Progress is presently coping with the consequences of a major variety of knowledge theft assaults that occurred after the clop ransomware gang, commencing on Might 27, exploited a zero-day vulnerability within the MOVEit Switch safe file switch platform.

The corporate is presently coping with the consequences of the widespread assault that started in Might 2023 and focused its MOVEit sharing safe file-sharing platform. It’s believed that over 62 million folks and over 2,100 organizations had been affected.

If you wish to preserve updated with every thing we submit, don’t neglect to comply with us on LinkedIn, Twitter, Facebookand Youtube for extra cybersecurity information and matters.

If you happen to appreciated this submit, you’ll get pleasure from our e-newsletter.

Get cybersecurity updates you’ll really need to learn instantly in your inbox.

Unique Publish URL: https://heimdalsecurity.com/weblog/progress-software-releases-urgent-patches-to-fix-ws_ftp-server-vulnerabilities/


Author:
Date: 2023-09-30 04:46:07

Source link

spot_imgspot_img

Subscribe

Related articles

spot_imgspot_img
Alina A, Toronto
Alina A, Torontohttp://alinaa-cybersecurity.com
Alina A, an UofT graduate & Google Certified Cyber Security analyst, currently based in Toronto, Canada. She is passionate for Research and to write about Cyber-security related issues, trends and concerns in an emerging digital world.

LEAVE A REPLY

Please enter your comment!
Please enter your name here