Vulnerabilites related to fortra - goanywhere_managed_file_transfer
cve-2024-25156
Vulnerability from cvelistv5
Published
2024-03-14 14:06
Modified
2024-08-01 23:36
Severity ?
EPSS score ?
Summary
A path traversal vulnerability exists in GoAnywhere MFT prior to 7.4.2 which allows attackers to circumvent endpoint-specific permission checks in the GoAnywhere Admin and Web Clients.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortra | GoAnywhere MFT |
Version: 6.0.1 ≤ 7.4.1 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-25156", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-03-14T15:52:32.871760Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T17:35:04.395Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T23:36:21.753Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.fortra.com/security/advisory/fi-2024-004", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "GoAnywhere MFT", vendor: "Fortra", versions: [ { lessThanOrEqual: "7.4.1", status: "affected", version: "6.0.1", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Mohammed Eldeeb & Islam Elrfai, Spark Engineering Consultants", }, { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "vcth4nh from VcsLab of Viettel Cyber Security", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\n<span style=\"background-color: rgba(9, 30, 66, 0.06);\">A path traversal vulnerability exists in GoAnywhere MFT prior to 7.4.2 which allows attackers to circumvent endpoint-specific permission checks in the GoAnywhere Admin and Web Clients.</span>\n\n", }, ], value: "\nA path traversal vulnerability exists in GoAnywhere MFT prior to 7.4.2 which allows attackers to circumvent endpoint-specific permission checks in the GoAnywhere Admin and Web Clients.\n\n", }, ], impacts: [ { capecId: "CAPEC-139", descriptions: [ { lang: "en", value: "CAPEC-139 Relative Path Traversal", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-03-14T14:06:01.498Z", orgId: "df4dee71-de3a-4139-9588-11b62fe6c0ff", shortName: "Fortra", }, references: [ { url: "https://www.fortra.com/security/advisory/fi-2024-004", }, ], source: { discovery: "UNKNOWN", }, title: "Path traversal in GoAnywhere MFT 7.4.1 and Earlier", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "df4dee71-de3a-4139-9588-11b62fe6c0ff", assignerShortName: "Fortra", cveId: "CVE-2024-25156", datePublished: "2024-03-14T14:06:01.498Z", dateReserved: "2024-02-06T21:23:57.925Z", dateUpdated: "2024-08-01T23:36:21.753Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-0204
Vulnerability from cvelistv5
Published
2024-01-22 18:05
Modified
2025-02-13 17:27
Severity ?
EPSS score ?
Summary
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortra | GoAnywhere MFT |
Version: 6.0.1 ≤ |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-01T17:41:15.984Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.fortra.com/security/advisory/fi-2024-001", }, { tags: [ "permissions-required", "x_transferred", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "affected", product: "GoAnywhere MFT", vendor: "Fortra", versions: [ { lessThan: "7.4.1", status: "affected", version: "6.0.1", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Mohammed Eldeeb & Islam Elrfai, Spark Engineering Consultants", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.", }, ], value: "Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.", }, ], impacts: [ { capecId: "CAPEC-1", descriptions: [ { lang: "en", value: "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-425", description: "CWE-425 Direct Request ('Forced Browsing')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-02-02T17:06:23.244Z", orgId: "df4dee71-de3a-4139-9588-11b62fe6c0ff", shortName: "Fortra", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.fortra.com/security/advisory/fi-2024-001", }, { tags: [ "permissions-required", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml", }, { url: "http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html", }, { url: "http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Upgrade to version 7.4.1 or higher. The vulnerability may also be eliminated in non-container deployments by deleting the InitialAccountSetup.xhtml file in the install directory and restarting the services. For container-deployed instances, replace the file with an empty file and restart. For additional information, see <a target=\"_blank\" rel=\"nofollow\" href=\"https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml\">https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml</a> (registration required).<a target=\"_blank\" rel=\"nofollow\" href=\"https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml\"></a>", }, ], value: "Upgrade to version 7.4.1 or higher. The vulnerability may also be eliminated in non-container deployments by deleting the InitialAccountSetup.xhtml file in the install directory and restarting the services. For container-deployed instances, replace the file with an empty file and restart. For additional information, see https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml (registration required). https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml", }, ], source: { advisory: "XXX-YYY", discovery: "UNKNOWN", }, title: "Authentication Bypass in GoAnywhere MFT", workarounds: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Users are encouraged to apply defense-in-depth tactics to limit access to the administrative console. Do not expose the console to the internet and apply web application controls such as a WAF, monitoring, and access controls. ", }, ], value: "Users are encouraged to apply defense-in-depth tactics to limit access to the administrative console. Do not expose the console to the internet and apply web application controls such as a WAF, monitoring, and access controls.", }, ], x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "df4dee71-de3a-4139-9588-11b62fe6c0ff", assignerShortName: "Fortra", cveId: "CVE-2024-0204", datePublished: "2024-01-22T18:05:13.194Z", dateReserved: "2024-01-03T00:12:28.436Z", dateUpdated: "2025-02-13T17:27:06.436Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-25157
Vulnerability from cvelistv5
Published
2024-08-14 15:04
Modified
2024-08-29 03:55
Severity ?
EPSS score ?
Summary
An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortra | GoAnywhere MFT |
Version: 6.0.1 ≤ |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "goanywhere_managed_file_transfer", vendor: "fortra", versions: [ { lessThan: "7.6.0", status: "affected", version: "6.0.1", versionType: "semver", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-25157", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-28T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-29T03:55:30.276Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "GoAnywhere MFT", vendor: "Fortra", versions: [ { lessThan: "7.6.0", status: "affected", version: "6.0.1", versionType: "semver", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.", }, ], value: "An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.", }, ], impacts: [ { capecId: "CAPEC-114", descriptions: [ { lang: "en", value: "CAPEC-114 Authentication Abuse", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-303", description: "CWE-303: Incorrect Implementation of Authentication Algorithm", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-14T15:04:10.987Z", orgId: "df4dee71-de3a-4139-9588-11b62fe6c0ff", shortName: "Fortra", }, references: [ { url: "https://www.fortra.com/security/advisories/product-security/fi-2024-009", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Upgrade to GoAnywhere MFT 7.6.0<br>", }, ], value: "Upgrade to GoAnywhere MFT 7.6.0", }, ], source: { discovery: "UNKNOWN", }, title: "Authentication bypass in GoAnywhere MFT prior to 7.6.0", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "df4dee71-de3a-4139-9588-11b62fe6c0ff", assignerShortName: "Fortra", cveId: "CVE-2024-25157", datePublished: "2024-08-14T15:04:10.987Z", dateReserved: "2024-02-06T21:23:57.925Z", dateUpdated: "2024-08-29T03:55:30.276Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-0669
Vulnerability from cvelistv5
Published
2023-02-06 19:16
Modified
2025-02-13 16:39
Severity ?
EPSS score ?
Summary
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortra | Goanywhere MFT |
Version: 0 ≤ 7.1.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:17:50.355Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1", }, { tags: [ "media-coverage", "x_transferred", ], url: "https://infosec.exchange/@briankrebs/109795710941843934", }, { tags: [ "third-party-advisory", "x_transferred", ], url: "https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/", }, { tags: [ "third-party-advisory", "x_transferred", ], url: "https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/rapid7/metasploit-framework/pull/17607", }, { tags: [ "media-coverage", "x_transferred", ], url: "https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft", }, { tags: [ "third-party-advisory", "x_transferred", ], url: "https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-0669", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2023-12-09T05:05:06.460030Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2023-02-10", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-0669", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-502", description: "CWE-502 Deserialization of Untrusted Data", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T14:10:19.429Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Goanywhere MFT", vendor: "Fortra", versions: [ { lessThanOrEqual: "7.1.1", status: "affected", version: "0", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "other", user: "00000000-0000-4000-9000-000000000000", value: "Brian Krebs of Krebs on Security", }, { lang: "en", type: "analyst", user: "00000000-0000-4000-9000-000000000000", value: "Ron Bowes of Rapid7", }, { lang: "en", type: "analyst", user: "00000000-0000-4000-9000-000000000000", value: "Caitlin Condon of Rapid7", }, { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Fryco of Frycos Security", }, ], datePublic: "2023-02-01T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.", }, ], value: "Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-502", description: "CWE-502 Deserialization of Untrusted Data", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-10T19:06:33.125Z", orgId: "9974b330-7714-4307-a722-5648477acda7", shortName: "rapid7", }, references: [ { tags: [ "vendor-advisory", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1", }, { tags: [ "media-coverage", ], url: "https://infosec.exchange/@briankrebs/109795710941843934", }, { tags: [ "third-party-advisory", ], url: "https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/", }, { tags: [ "third-party-advisory", ], url: "https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis", }, { tags: [ "exploit", ], url: "https://github.com/rapid7/metasploit-framework/pull/17607", }, { tags: [ "media-coverage", ], url: "https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft", }, { tags: [ "third-party-advisory", ], url: "https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html", }, { url: "http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html", }, ], source: { discovery: "UNKNOWN", }, title: "Fortra GoAnywhere MFT License Response Servlet Command Injection", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "9974b330-7714-4307-a722-5648477acda7", assignerShortName: "rapid7", cveId: "CVE-2023-0669", datePublished: "2023-02-06T19:16:19.265Z", dateReserved: "2023-02-03T22:09:23.898Z", dateUpdated: "2025-02-13T16:39:06.775Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2024-08-14 15:15
Modified
2024-08-19 18:57
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Summary
An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortra | goanywhere_managed_file_transfer | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "473E0873-F26C-4E9A-B58A-CF853E6F07DF", versionEndExcluding: "7.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.", }, { lang: "es", value: "Una vulnerabilidad de omisión de autenticación en GoAnywhere MFT anterior a 7.6.0 permite a los usuarios administradores con acceso a la consola del agente omitir algunas comprobaciones de permisos cuando intentan visitar otras páginas. Esto podría dar lugar a la divulgación o modificación no autorizada de información.", }, ], id: "CVE-2024-25157", lastModified: "2024-08-19T18:57:58.657", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-14T15:15:18.023", references: [ { source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", tags: [ "Vendor Advisory", ], url: "https://www.fortra.com/security/advisories/product-security/fi-2024-009", }, ], sourceIdentifier: "df4dee71-de3a-4139-9588-11b62fe6c0ff", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-303", }, ], source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-02-06 20:15
Modified
2025-03-06 20:11
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortra | goanywhere_managed_file_transfer | * |
{ cisaActionDue: "2023-03-03", cisaExploitAdd: "2023-02-10", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Fortra GoAnywhere MFT Remote Code Execution Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD23-E5EA-4830-9D57-5E6BC0E85244", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.", }, ], id: "CVE-2023-0669", lastModified: "2025-03-06T20:11:58.860", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-02-06T20:15:14.300", references: [ { source: "cve@rapid7.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html", }, { source: "cve@rapid7.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis", }, { source: "cve@rapid7.com", tags: [ "Third Party Advisory", ], url: "https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft", }, { source: "cve@rapid7.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html", }, { source: "cve@rapid7.com", tags: [ "Patch", ], url: "https://github.com/rapid7/metasploit-framework/pull/17607", }, { source: "cve@rapid7.com", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://infosec.exchange/@briankrebs/109795710941843934", }, { source: "cve@rapid7.com", tags: [ "Product", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1", }, { source: "cve@rapid7.com", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/rapid7/metasploit-framework/pull/17607", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://infosec.exchange/@briankrebs/109795710941843934", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Product", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/", }, ], sourceIdentifier: "cve@rapid7.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-502", }, ], source: "cve@rapid7.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-502", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-502", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-01-22 18:15
Modified
2024-11-21 08:46
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortra | goanywhere_managed_file_transfer | * | |
fortra | goanywhere_managed_file_transfer | 6.0.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "383EAFF6-9DE9-4054-8C0E-B685C9509EB6", versionEndExcluding: "7.4.1", versionStartIncluding: "7.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:6.0.0:*:*:*:*:*:*:*", matchCriteriaId: "8BBD2B0B-3524-4138-8138-39DA5D0434F0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.", }, { lang: "es", value: "La omisión de autenticación en GoAnywhere MFT de Fortra anterior a 7.4.1 permite a un usuario no autorizado crear un usuario administrador a través del portal de administración.", }, ], id: "CVE-2024-0204", lastModified: "2024-11-21T08:46:03.627", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-01-22T18:15:20.137", references: [ { source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html", }, { source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", url: "http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html", }, { source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", tags: [ "Permissions Required", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml", }, { source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", tags: [ "Vendor Advisory", ], url: "https://www.fortra.com/security/advisory/fi-2024-001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.fortra.com/security/advisory/fi-2024-001", }, ], sourceIdentifier: "df4dee71-de3a-4139-9588-11b62fe6c0ff", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-425", }, ], source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-425", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-03-14 14:15
Modified
2025-01-23 18:14
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
A path traversal vulnerability exists in GoAnywhere MFT prior to 7.4.2 which allows attackers to circumvent endpoint-specific permission checks in the GoAnywhere Admin and Web Clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortra | goanywhere_managed_file_transfer | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "7E6A0B17-E6A0-4FF2-8FA6-5B0E24C22BC6", versionEndExcluding: "7.4.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "\nA path traversal vulnerability exists in GoAnywhere MFT prior to 7.4.2 which allows attackers to circumvent endpoint-specific permission checks in the GoAnywhere Admin and Web Clients.\n\n", }, { lang: "es", value: "Existe una vulnerabilidad de path traversal en GoAnywhere MFT anterior a 7.4.2 que permite a los atacantes eludir las comprobaciones de permisos específicos de los terminales en GoAnywhere Admin y Web Clients.", }, ], id: "CVE-2024-25156", lastModified: "2025-01-23T18:14:11.203", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-03-14T14:15:07.857", references: [ { source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", tags: [ "Vendor Advisory", ], url: "https://www.fortra.com/security/advisory/fi-2024-004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.fortra.com/security/advisory/fi-2024-004", }, ], sourceIdentifier: "df4dee71-de3a-4139-9588-11b62fe6c0ff", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "df4dee71-de3a-4139-9588-11b62fe6c0ff", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }