June 23, 2023, 2:58 p.m. |

Packet Storm packetstormsecurity.com

This Metasploit module exploits an SQL injection vulnerability in the MOVEit Transfer web application that allows an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker can leverage an information leak be able to upload a .NET deserialization payload.

access application azure database deserialization engine exploits information injection leak metasploit microsoft microsoft sql microsoft sql server moveit moveit transfer mysql payload server sql sql injection sql server transfer upload vulnerability web web application

Cyber Security Analyst

@ Dane Street | Palm Beach Gardens, Florida, United States

Program Information System Security Manager (ISSM) - onsite Tucson, AZ - TOP SECRET required

@ RTX | AZ855: RMS AP Bldg M05 1151 East Hermans Road Building M05, Tucson, AZ, 85756 USA

Lead - Business System Service (Workday HR Functional Consultant)

@ Freshworks | Bengaluru, India

Cloud Security Engineer

@ ButterflyMX | United States - Remote

Compliance Specialist

@ Airtable | Austin, Texas or San Francisco, California

Cyber SCRM Cloud Assessor Lead

@ Accenture Federal Services | Arlington, VA