CVE-2023-0669
HIGH KEV RANSOMWARE NUCLEIFortra GoAnywhere MFT Unsafe Deserialization RCE
Title source: metasploitDescription
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
Exploits (8)
nomisec
WORKING POC
by zakaria-laouani · poc
https://github.com/zakaria-laouani/cve-2023-0669-simulation
exploitdb
WORKING POC
by Youssef Muhammad · javawebappsjava
https://www.exploit-db.com/exploits/51339
metasploit
WORKING POC
EXCELLENT
by Ron Bowes, Frycos (Florian Hauser) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/fortra_goanywhere_rce_cve_2023_0669.rb
Nuclei Templates (1)
Fortra GoAnywhere MFT - Remote Code Execution
HIGHVERIFIEDby rootxharsh,iamnoooob,dhiyaneshdk,pdresearch
Shodan:
http.favicon.hash:1484947000 || http.favicon.hash:1484947000,1828756398,1170495932
FOFA:
app="goanywhere-mft" || icon_hash=1484947000 || icon_hash=1484947000,1828756398,1170495932
References (9)
Scores
CVSS v3
7.2
EPSS
0.9438
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2023-02-10
VulnCheck KEV
2023-02-08
InTheWild.io
2023-02-10
ENISA EUVD
EUVD-2023-0644
Ransomware Use
Confirmed
Classification
CWE
CWE-502
Status
published
Affected Products (2)
fortra/goanywhere_managed_file_transfer
< 7.1.2
rubygems/metasploit-framework
RubyGems
Timeline
Published
Feb 06, 2023
KEV Added
Feb 10, 2023
Tracked Since
Feb 18, 2026