In Progress MOVEit Transfer versions released before 2022.0.11 (14.0.11), 2022.1.12 (14.1.12), 2023.0.9 (15.0.9), 2023.1.4 (15.1.4), a logging bypass vulnerability has been discovered. An authenticated user could manipulate a request to bypass the logging mechanism within the web application which results in user activity not being logged properly.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Jan 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Progress
Progress moveit Transfer |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:* | |
Vendors & Products |
Progress
Progress moveit Transfer |

Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-08-01T19:11:53.265Z
Reserved: 2024-03-07T17:27:18.819Z
Link: CVE-2024-2291

Updated: 2024-08-01T19:11:53.265Z

Status : Analyzed
Published: 2024-03-20T15:15:08.010
Modified: 2025-01-16T18:02:45.747
Link: CVE-2024-2291

No data.