First published: Mon Jan 22 2024(Updated: )
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
HelpSystems GoAnywhere Managed File Transfer | =7.4.1 | |
HelpSystems GoAnywhere Managed File Transfer | >=7.0.0<7.4.1 | |
HelpSystems GoAnywhere Managed File Transfer | =6.0.0 |
Upgrade to version 7.4.1 or higher. The vulnerability may also be eliminated in non-container deployments by deleting the InitialAccountSetup.xhtml file in the install directory and restarting the services. For container-deployed instances, replace the file with an empty file and restart. For additional information, see https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml (registration required). https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0204 is considered a critical severity vulnerability due to its potential for authentication bypass.
To fix CVE-2024-0204, upgrade Fortra GoAnywhere MFT to version 7.4.1 or later.
CVE-2024-0204 allows an unauthorized user to create an admin user via the administration portal.
CVE-2024-0204 affects Fortra GoAnywhere MFT versions from 6.0.0 to 7.4.0.
Yes, an exploit for CVE-2024-0204 has been published, enabling attackers to leverage the authentication bypass.