CVE-2024-0204

CRITICAL EXPLOITED NUCLEI

Fortra GoAnywhere MFT Unauthenticated Remote Code Execution

Title source: metasploit

Description

Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.

Exploits (9)

exploitdb WORKING POC
by İbrahimsql · pythonremotemultiple
https://www.exploit-db.com/exploits/52308
nomisec WORKING POC 65 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2024-0204
nomisec SCANNER 4 stars
by cbeek-r7 · infoleak
https://github.com/cbeek-r7/CVE-2024-0204
nomisec WORKING POC 2 stars
by ibrahmsql · remote
https://github.com/ibrahmsql/CVE-2024-0204
nomisec WORKING POC 2 stars
by m-cetin · remote
https://github.com/m-cetin/CVE-2024-0204
nomisec WORKING POC 1 stars
by adminlove520 · remote
https://github.com/adminlove520/CVE-2024-0204
vulncheck_xdb WORKING POC
remote
https://github.com/YUUKI4O4/POC
metasploit WORKING POC EXCELLENT
by sfewer-r7, James Horseman, Zach Hanley · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/fortra_goanywhere_mft_rce_cve_2024_0204.rb

Nuclei Templates (1)

Fortra GoAnywhere MFT - Authentication Bypass
CRITICALVERIFIEDby DhiyaneshDK
Shodan: http.favicon.hash:1484947000,1828756398,1170495932 || http.favicon.hash:1484947000
FOFA: app="GoAnywhere-MFT" || icon_hash=1484947000 || icon_hash=1484947000,1828756398,1170495932 || app="goanywhere-mft"

Scores

CVSS v3 9.8
EPSS 0.9305
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-01-25
CWE
CWE-425
Status published
Products (2)
fortra/goanywhere_managed_file_transfer 6.0.0
fortra/goanywhere_managed_file_transfer 7.0.0 - 7.4.1
Published Jan 22, 2024
Tracked Since Feb 18, 2026