CVE-2024-0204
Fortra GoAnywhere MFT Authentication Bypass
Description
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
INFO
Published Date :
Jan. 22, 2024, 6:15 p.m.
Last Modified :
Nov. 21, 2024, 8:46 a.m.
Source :
df4dee71-de3a-4139-9588-11b62fe6c0ff
Remotely Exploitable :
Yes !
Impact Score :
5.9
Exploitability Score :
3.9
Public PoC/Exploit Available at Github
CVE-2024-0204 has a 11 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-0204
.
URL | Resource |
---|---|
http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html | |
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml | Permissions Required |
https://www.fortra.com/security/advisory/fi-2024-001 | Vendor Advisory |
http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html | |
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml | Permissions Required |
https://www.fortra.com/security/advisory/fi-2024-001 | Vendor Advisory |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
A repository to store all my published work.
CLI utility to query Shodan's CVE DB
cve-search shodan shodan-client
Go
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Assembly Python Shell PHP C++ C Go Ruby HTML Java
GoAnywhere MFT
Python
This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes.
Python
Scanning for vulnerable GoAnywhere MFT CVE-2024-0204
Python
Authentication Bypass in GoAnywhere MFT
Python
一个CVE漏洞预警知识库 no exp/poc
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
cisa-kev vulnerability 0day cisa exploits
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
penetration-testing poc getshell csrf penetration-testing-poc csrf-webshell cve rce sql-poc poc-exp bypass oa-getshell cve-cms php-bypass thinkphp sql-getshell authentication-bypass cobalt-strike exploit
Python Ruby Makefile C C++ Shell HTML Java Assembly PHP
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-0204
vulnerability anywhere in the article.
- Cybersecurity News
Phishing Frenzy: Cloudflare Domains Exploited in Latest Attacks
A new report from cybersecurity firm Fortra has revealed a dramatic increase in the abuse of Cloudflare’s pages.dev and workers.dev domains for phishing attacks. This abuse capitalizes on Cloudflare’s ... Read more
- Kaspersky
Advanced threat predictions for 2025
We at Kaspersky’s Global Research and Analysis Team monitor over 900 APT (advanced persistent threat) groups and operations. At the end of each year, we take a step back to assess the most complex and ... Read more
- Cybersecurity News
CVE-2024-6633 (CVSS 9.8): Critical Flaw in Fortra FileCatalyst Workflow
Fortra, a prominent provider of enterprise file transfer solutions, has released an urgent security advisory highlighting two critical vulnerabilities within its FileCatalyst Workflow product. Designa ... Read more
- Cybersecurity News
Windows Users Beware: CVE-2024-6768 – New ‘Blue Screen of Death’ Vulnerability Affects All
A newly discovered vulnerability in the Windows operating system has raised concerns among cybersecurity experts due to its potential to trigger the infamous “Blue Screen of Death” (BSOD). Identified ... Read more
The following table lists the changes that have been made to the
CVE-2024-0204
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html Added Reference http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html Added Reference https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml Added Reference https://www.fortra.com/security/advisory/fi-2024-001 -
CVE Modified by df4dee71-de3a-4139-9588-11b62fe6c0ff
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by df4dee71-de3a-4139-9588-11b62fe6c0ff
Feb. 02, 2024
Action Type Old Value New Value Added Reference Fortra http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html [No types assigned] -
Initial Analysis by [email protected]
Jan. 29, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Changed Reference Type http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html No Types Assigned http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html Third Party Advisory, VDB Entry Changed Reference Type https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml No Types Assigned https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml Permissions Required Changed Reference Type https://www.fortra.com/security/advisory/fi-2024-001 No Types Assigned https://www.fortra.com/security/advisory/fi-2024-001 Vendor Advisory Added CWE NIST CWE-425 Added CPE Configuration OR *cpe:2.3:a:fortra:goanywhere_managed_file_transfer:6.0.0:*:*:*:*:*:*:* *cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.4.1 -
CVE Modified by df4dee71-de3a-4139-9588-11b62fe6c0ff
Jan. 24, 2024
Action Type Old Value New Value Added Reference Fortra http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html [No types assigned] -
CVE Received by df4dee71-de3a-4139-9588-11b62fe6c0ff
Jan. 22, 2024
Action Type Old Value New Value Added Description Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal. Added Reference Fortra https://www.fortra.com/security/advisory/fi-2024-001 [No types assigned] Added Reference Fortra https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml [No types assigned] Added CWE Fortra CWE-425 Added CVSS V3.1 Fortra AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-0204
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-0204
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
43.16 }} 3.61%
score
0.97402
percentile