CVE-2023-0669
Fortra GoAnywhere MFT Remote Code Execution Vulner - [Actively Exploited]
Description
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
INFO
Published Date :
Feb. 6, 2023, 8:15 p.m.
Last Modified :
June 28, 2024, 1:44 p.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
5.9
Exploitability Score :
1.2
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Fortra (formerly, HelpSystems) GoAnywhere MFT contains a pre-authentication remote code execution vulnerability in the License Response Servlet due to deserializing an attacker-controlled object.
Apply updates per vendor instructions.
This CVE has a CISA AA located here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a. Please see the AA for associated IOCs. Additional information is available at: https://my.goanywhere.com/webclient/DownloadProductFiles.xhtml. Fortra users must have an account in order to login and access the patch.
Public PoC/Exploit Available at Github
CVE-2023-0669 has a 12 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2023-0669
.
URL | Resource |
---|---|
http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis | Exploit Third Party Advisory |
https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft | Third Party Advisory |
https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html | Exploit Third Party Advisory |
https://github.com/rapid7/metasploit-framework/pull/17607 | Patch |
https://infosec.exchange/@briankrebs/109795710941843934 | Mitigation Third Party Advisory |
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1 | Product |
https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/ | Mitigation Third Party Advisory |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
ebpf exploit falco linux osquery runtime-security threat-hunting openpolicyagent rego cloudnative cve yara cloudsecurity vulnerability-management threat-intelligence vulnerability-intelligence threat-detection
Open Policy Agent
None
GoAnywhere MFT CVE-2023-0669 LicenseResponseServlet Deserialization Vulnerabilities Python RCE PoC(Proof of Concept)
cve-2023-0669 deserialization-vulnerabilities licenseresponseservlet
Python
CVE analysis for CVE-2023-0669
None
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
None
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
Java
Collect some iot-related security articles, including vulnerability analysis, security conferences and papers, etc.
iot-security
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
cisa-kev vulnerability 0day cisa exploits
essential templates for kenzer [DEPRECATED]
kenzer vulnerabilities kenzer-templates arpsyndicate
Python Shell Ruby
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-0669
vulnerability anywhere in the article.
- security.nl
VS publiceert overzicht van meest misbruikte kwetsbaarheden in 2023
De Amerikaanse autoriteiten hebben samen met cyberagentschappen uit Australië, Canada, Nieuw-Zeeland en het Verenigd Koninkrijk een overzicht van de meest misbruikte kwetsbaarheden in 2023 opgesteld. ... Read more
The following table lists the changes that have been made to the
CVE-2023-0669
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
Jun. 28, 2024
Action Type Old Value New Value Changed Reference Type http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html No Types Assigned http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
Apr. 10, 2023
Action Type Old Value New Value Added Reference http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html [No Types Assigned] -
Initial Analysis by [email protected]
Feb. 15, 2023
Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis No Types Assigned https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis Exploit, Third Party Advisory Changed Reference Type https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft No Types Assigned https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft Third Party Advisory Changed Reference Type https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html No Types Assigned https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html Exploit, Third Party Advisory Changed Reference Type https://github.com/rapid7/metasploit-framework/pull/17607 No Types Assigned https://github.com/rapid7/metasploit-framework/pull/17607 Patch Changed Reference Type https://infosec.exchange/@briankrebs/109795710941843934 No Types Assigned https://infosec.exchange/@briankrebs/109795710941843934 Mitigation, Third Party Advisory Changed Reference Type https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1 No Types Assigned https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1 Product Changed Reference Type https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/ No Types Assigned https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/ Mitigation, Third Party Advisory Added CWE NIST CWE-502 Added CPE Configuration OR *cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.2 -
CVE Modified by [email protected]
Feb. 08, 2023
Action Type Old Value New Value Added Reference https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html [No Types Assigned] -
CVE Modified by [email protected]
Feb. 08, 2023
Action Type Old Value New Value Changed Description Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2. Added Reference https://github.com/rapid7/metasploit-framework/pull/17607 [No Types Assigned] Added Reference https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft [No Types Assigned] -
CVE Modified by [email protected]
Feb. 06, 2023
Action Type Old Value New Value Added Reference https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis [No Types Assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-0669
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-0669
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
97.19 }} 0.01%
score
0.99859
percentile