CVE-2023-0669

high

Description

Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.

References

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a

https://blog.talosintelligence.com/common-ransomware-actor-ttps-playbooks/

https://www.bleepingcomputer.com/news/security/exploit-for-critical-fortra-filecatalyst-workflow-sqli-flaw-released/

https://research.checkpoint.com/2024/sharp-dragon-expands-towards-africa-and-the-caribbean/

https://services.google.com/fh/files/misc/m-trends-2024.pdf

https://www.scworld.com/news/fortra-filecatalyst-rce-bug-disclosed-full-poc-exploit-available

https://www.tenable.com/blog/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-vulnerability

https://www.tenable.com/blog/faq-for-moveit-transfer-vulnerabilities-cve-2023-34362-and-cl0p-ransomware-gang

https://www.tenable.com/blog/cve-2023-34362-moveit-transfer-critical-zero-day-vulnerability-exploited-in-the-wild

https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1

https://infosec.exchange/@briankrebs/109795710941843934

https://github.com/rapid7/metasploit-framework/pull/17607

https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html

https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft

https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis

http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html

Details

Source: Mitre, NVD

Published: 2023-02-06

Updated: 2024-06-28

Risk Information

CVSS v2

Base Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Severity: High