Users of Progress Software WS_FTP Server Urged to Immediately Upgrade
Progress Software, the company behind the MOVEit Transfer file transfer solution that was recently subject to mass hacking and data theft attacks by the Clop threat group, has issued a warning to all users of its WS_FTP Server file transfer software to apply patches to fix 8 vulnerabilities, including two critical flaws that can be exploited in low-complexity attacks that require no user interaction. The vulnerabilities affect the WS_FTP Server Ad hoc Transfer Module and the WS_FTP Server Manager interface.
- CVE-2023-40444 (CVSS: 10) is a maximum-severity remote code execution vulnerability that affects all versions of WS_FTP Server prior to 8.7.4 and 8.8.2. A pre-authenticated attacker could exploit a .NET deserialization vulnerability in the Ad hoc Transfer Module and remotely execute commands on the underlying WS_FTP Server operating system.
- CVE-2023-42657 (CVSS: 9.9) is a critical directory traversal vulnerability that affects all versions of WS_FTP Server prior to 8.7.4 and 8.8.2. Successful exploitation of the vulnerability would allow an attacker to perform file operations (delete, rename, rmdir, mkdir) on files and folders outside of their authorized WS_FTP folder path. An attacker could also escape the context of the WS_FTP Server file structure and perform the same level of operations on file and folder locations on the underlying operating system.
The latest patches include fixes for three high-severity vulnerabilities:
- CVE-2023-40045 (CVSS: 8.3) is a reflected cross-site scripting (XSS) vulnerability affecting all versions prior to 8.7.4 and 8.8.2. The vulnerability could be exploited to target WS-FTP Server users with a specialized payload that allows the execution of malicious JavaScript within the context of the victim’s browser.
- CVE-2023-40046 (CVSS: 8.2) is a SQL injection vulnerability affecting all versions prior to 8.7.4 and 8.8.2. An attacker could exploit the vulnerability and infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements.
- CVE-2023-40047 (CVSS: 8.3) is a stored cross-site scripting vulnerability affecting all versions prior to 8.8.2. An attacker with administrative privileges could import an SSL certificate with malicious attributes containing XSS payloads, and once installed could target WS_FTP Server admins with a specialized payload that results in the execution of malicious JavaScript within the context of the victim’s browser.
Patches have also been released to fix three medium-severity vulnerabilities: A cross-site request forgery (CSRF) Vulnerability – CVE-2023-40048 (CVSS:6.8); a Reflected XSS vulnerability – CVE-2022-27665 (CVSS: 6.1); and an information Disclosure vulnerability – CVE-2023-40049 (CVSS: 5.3).
Progress Software has recommended all users immediately upgrade to the latest version (8.8.2) by using the full installer, as it is the only way that the vulnerabilities can be fully remediated. Users of unsupported versions should ensure they upgrade to a fixed version of a supported product. Upgrading will result in an outage while the upgrade is running. If it is not possible to immediately upgrade, Progress Software says it is possible to mitigate the vulnerability by removing the WS_FTP Server Ad Hoc Transfer Module if it is not being used.
Get The FREE
HIPAA Compliance Checklist
Immediate Delivery of Checklist Link To Your Email Address
Please Enter Correct Email Address
Your Privacy Respected
HIPAA Journal Privacy Policy
“We have responsibly disclosed these vulnerabilities in conjunction with the researchers at Assetnote,” explained a spokesperson for Progress Software. “Currently, we have not seen any indication that these vulnerabilities have been exploited. We have issued a fix and have encouraged our customers to perform an upgrade to the patched version of our software. Security is of the utmost importance to us and we leverage development practices to minimize product vulnerabilities whenever possible.”
Vulnerabilities in file transfer solutions are actively sought by threat actors. The Clop group mass exploited vulnerabilities in two such solutions this year – Progress Software’s MOVEit Transfer solution and Fortra’s GoAnywhere MFT. The Clop group exploited the MOVEit Transfer vulnerability in attacks on at least 2,100 organizations and exfiltrated the data of more than 62 million individuals.


