GoAnywhere MFT - Remote Code Execution (CVE-2023-0669)
- Severity
- CVSSv3 Score
- 7.2
- Vulnerability description
GoAnywhere MFT is vulnerable to CVE-2023-0669, a Command Injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. The root cause of this vulnerability is inside the Bundle servlet of the
/goanywhere/lic/accept
endpoint allowing an attacker to manipulate serialized objects in order to pass harmful data into the application code.- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the GoAnywhere MFT Server to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the GoAnywhere MFT to the latest version.
- References
https://nvd.nist.gov/vuln/detail/CVE-2023-0669
https://hstechdocs.helpsystems.com/releasenotes/Content/_ProductPages/GoAnywhere/GAMFT.htm
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Feb 2023
- Published at
- Updated at
- Software Type
- File transfer framework
- Vendor
- Fortra
- Product
- GoAnywhere