{"id":31817,"date":"2023-09-29T02:41:29","date_gmt":"2023-09-29T00:41:29","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=31817"},"modified":"2023-09-29T02:41:29","modified_gmt":"2023-09-29T00:41:29","slug":"moveit-vendor-progress-software-reports-serious-vulnerabilities-in-ws_ftp-server","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/09\/29\/moveit-vendor-progress-software-reports-serious-vulnerabilities-in-ws_ftp-server\/","title":{"rendered":"MoveIT vendor Progress Software reports serious vulnerabilities in WS_FTP Server"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2023\/09\/29\/moveit-anbieter-progress-software-meldet-gravierende-schwachstellen-in-ws_ftp-server\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Progress Software, which has been hit hard by the MoveIT vulnerability, is facing the next trouble. There are further serious vulnerabilities in its WS_FTP Server software that could already being exploited in the wild. The products must be immediately provided with the emergency patch to secure them.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg01.met.vgwort.de\/na\/b292fc53237f429aa29fec46781642a9\" alt=\"\" width=\"1\" height=\"1\" \/>Vendor Progress Software had to report and patch several vulnerabilities in its MoveIT Transfer software in June\/July 2023. The vulnerabilities were exploited by the Clop ransomware group to steal data from organizations, government agencies, companies. The victims were blackmailed with the threat that the sensitive data would be made public and were supposed to pay ransom. I assume that there are over a thousand victims and the ransomware gang extorted many millions of euros in ransom. The links at the end of the article deal with MoveIT transfer vulnerabilities.<\/p>\n<h2>Vulnerabilities in WS_FTP Server<\/h2>\n<p>WS_FTP Server (WinSock File Transfer Protocol) is a software package for secure file transfer <a href=\"https:\/\/en.wikipedia.org\/wiki\/WS_FTP\" target=\"_blank\" rel=\"noopener\">offered<\/a> by Ipswitch, Inc (now Progress Software). Yesterday a security advisory was published by Progress Software pointing out serious security vulnerabilities in WS_FTP Server. John Hammond points out the security advisory <a href=\"https:\/\/community.progress.com\/s\/article\/WS-FTP-Server-Critical-Vulnerability-September-2023\" target=\"_blank\" rel=\"noopener\">WS_FTP Server Critical Vulnerability &#8211; (September 2023)<\/a> from Progress Software in their community in the following <a href=\"https:\/\/twitter.com\/_JohnHammond\/status\/1707455965929603220\" target=\"_blank\" rel=\"noopener\">tweet<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/_JohnHammond\/status\/1707455965929603220\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"WS_FTP Server vulnerabilities\" src=\"https:\/\/i.postimg.cc\/pXfP2shx\/image.png\" alt=\"WS_FTP Server vulnerabilities\" \/><\/a><\/p>\n<p>The WS_FTP team has been notified of recently discovered vulnerabilities in the WS_FTP Server Ad hoc Transfer Module and the WS_FTP Server Manager interface. All versions of WS_FTP Server are affected by these vulnerabilities. Critical vulnerability <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-40044\" target=\"_blank\" rel=\"noopener\">CVE-2023-40044<\/a> has a CVSS score of 10 (cannot go higher) and affects WS_FTP Server versions prior to 8.7.4 and 8.8.2. A pre-authenticated attacker can exploit a .NET deserialization vulnerability in the Ad Hoc Transfer Module to execute remote commands on the underlying WS_FTP Server operating system.<\/p>\n<p>Critical vulnerability <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-42657\">CVE-2023-42657<\/a> has a CVSS score of 9.9, affecting WS_FTP Server versions prior to 8.7.4 and 8.8.2. The vulnerability is related to directory bypass. An attacker could exploit this vulnerability to perform file operations (delete, rename, rmdir, mkdir) on files and folders outside the authorized WS_FTP folder path. Attackers could also break out of the context of the WS_FTP server file structure and perform the same operations (delete, rename, rmdir, mkdir) on file and folder locations on the underlying operating system.<\/p>\n<p>The Record has provided some more details about the vulnerabilities in <a href=\"https:\/\/therecord.media\/progress-new-file-transfer-vulnerability\" target=\"_blank\" rel=\"noopener\">this article<\/a>. There are a number of other vulnerabilities in WS_FTP that are described in <a href=\"https:\/\/community.progress.com\/s\/article\/WS-FTP-Server-Critical-Vulnerability-September-2023\" target=\"_blank\" rel=\"noopener\">this article<\/a>. Progress Software writes that the vulnerabilities have been fixed and that they are providing version-specific hotfixes to customers to fix the bugs. So far there are no known cases where the vulnerabilities are exploited.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2023\/06\/02\/warning-moveit-vulnerability-is-abused-in-attacks-data-extradicted\/\" rel=\"bookmark\">Warning: MOVEit vulnerability is abused in attacks, data extradicted<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/06\/05\/lace-tempest-clop-ransomware-gang-exploits-moveit-vulnerability-cve-2023-34362\/\" rel=\"bookmark\">Lace Tempest\/Clop ransomware gang exploits MOVEit vulnerability CVE-2023-34362<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/06\/10\/moveit-transfer-new-vulnerability-patch-urgently\/\" rel=\"bookmark\">MOVEit Transfer: New vulnerability; patch urgently!<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/07\/08\/moveit-transfer-new-security-advisory-and-update-july-6-2023\/\" rel=\"bookmark\">MOVEit Transfer: New security advisory and update (July 6, 2023)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/07\/11\/data-leak-at-german-postbank-and-deutsche-bank-blame-moveit\/\" rel=\"bookmark\">Data leak at German Postbank and Deutsche Bank (blame MOVEit?)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Progress Software, which has been hit hard by the MoveIT vulnerability, is facing the next trouble. There are further serious vulnerabilities in its WS_FTP Server software that could already being exploited in the wild. The products must be immediately provided &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/09\/29\/moveit-vendor-progress-software-reports-serious-vulnerabilities-in-ws_ftp-server\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-31817","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/31817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=31817"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/31817\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=31817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=31817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=31817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}