CVE-2023-0669

HIGH KEV RANSOMWARE NUCLEI

Fortra GoAnywhere MFT Unsafe Deserialization RCE

Title source: metasploit

Description

Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.

Exploits (8)

nomisec WORKING POC 103 stars
by 0xf4n9x · remote
https://github.com/0xf4n9x/CVE-2023-0669
nomisec WORKING POC 8 stars
by Avento · remote
https://github.com/Avento/CVE-2023-0669
nomisec WRITEUP 7 stars
by yosef0x01 · poc
https://github.com/yosef0x01/CVE-2023-0669-Analysis
nomisec WRITEUP
by cataliniovita · poc
https://github.com/cataliniovita/CVE-2023-0669
nomisec WORKING POC
by zakaria-laouani · poc
https://github.com/zakaria-laouani/cve-2023-0669-simulation
exploitdb WORKING POC
by Youssef Muhammad · javawebappsjava
https://www.exploit-db.com/exploits/51339
metasploit WORKING POC EXCELLENT
by Ron Bowes, Frycos (Florian Hauser) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/fortra_goanywhere_rce_cve_2023_0669.rb

Nuclei Templates (1)

Fortra GoAnywhere MFT - Remote Code Execution
HIGHVERIFIEDby rootxharsh,iamnoooob,dhiyaneshdk,pdresearch
Shodan: http.favicon.hash:1484947000 || http.favicon.hash:1484947000,1828756398,1170495932
FOFA: app="goanywhere-mft" || icon_hash=1484947000 || icon_hash=1484947000,1828756398,1170495932

Scores

CVSS v3 7.2
EPSS 0.9438
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2023-02-10
VulnCheck KEV 2023-02-08
InTheWild.io 2023-02-10
ENISA EUVD EUVD-2023-0644
Ransomware Use Confirmed

Classification

CWE
CWE-502
Status published

Affected Products (2)

fortra/goanywhere_managed_file_transfer < 7.1.2
rubygems/metasploit-framework RubyGems

Timeline

Published Feb 06, 2023
KEV Added Feb 10, 2023
Tracked Since Feb 18, 2026