CVE-2024-0204
CRITICAL EXPLOITED NUCLEIFortra GoAnywhere MFT Unauthenticated Remote Code Execution
Title source: metasploitDescription
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
Exploits (9)
exploitdb
WORKING POC
by İbrahimsql · pythonremotemultiple
https://www.exploit-db.com/exploits/52308
metasploit
WORKING POC
EXCELLENT
by sfewer-r7, James Horseman, Zach Hanley · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/fortra_goanywhere_mft_rce_cve_2024_0204.rb
Nuclei Templates (1)
Fortra GoAnywhere MFT - Authentication Bypass
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
http.favicon.hash:1484947000,1828756398,1170495932 || http.favicon.hash:1484947000
FOFA:
app="GoAnywhere-MFT" || icon_hash=1484947000 || icon_hash=1484947000,1828756398,1170495932 || app="goanywhere-mft"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9305
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-25
CWE
CWE-425
Status
published
Products (2)
fortra/goanywhere_managed_file_transfer
6.0.0
fortra/goanywhere_managed_file_transfer
7.0.0 - 7.4.1
Published
Jan 22, 2024
Tracked Since
Feb 18, 2026