A SQL injection vulnerability has been found in the Progress MOVEit Transfer web application and has been assigned CVE-2023-34362 (also known as MOVEit Transfer Critical SQL Injection Vulnerability). Fastly has created a virtual patch for it that is now available within your account.
- Log in to the Signal Sciences console.
- From the Sites menu, select a site if you have more than one site.
- From the Rules menu, select Templated Rules.
- In the search bar, enter
CVE-2023-34362
and then click the View link for the CVE-2023-34362 templated rule. - Click the Configure button.
- Click the Add trigger button, and select the Block requests from an IP immediately if the CVE-2023-34362 signal is observed checkbox.
- Click the Update rule button.
Recent Posts