A SQL injection vulnerability has been found in the Progress MOVEit Transfer web application and has been assigned CVE-2023-34362 (also known as MOVEit Transfer Critical SQL Injection Vulnerability). Fastly has created a virtual patch for it that is now available within your account.

  1. Log in to the Signal Sciences console.
  2. From the Sites menu, select a site if you have more than one site.
  3. From the Rules menu, select Templated Rules.
  4. In the search bar, enter CVE-2023-34362 and then click the View link for the CVE-2023-34362 templated rule.
  5. Click the Configure button.
  6. Click the Add trigger button, and select the Block requests from an IP immediately if the CVE-2023-34362 signal is observed checkbox.
  7. Click the Update rule button.
Recent Posts

Start typing and press Enter to search