First published: Wed Aug 14 2024(Updated: )
An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
HelpSystems GoAnywhere Managed File Transfer | <7.6.0 |
Upgrade to GoAnywhere MFT 7.6.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25157 is considered a critical vulnerability as it allows unauthorized access and modification of sensitive information.
To fix CVE-2024-25157, upgrade GoAnywhere MFT to version 7.6.0 or later to resolve the authentication bypass issue.
Due to CVE-2024-25157, attackers may access or modify sensitive information that should be restricted based on user permissions.
CVE-2024-25157 affects Admin Users of GoAnywhere MFT prior to version 7.6.0 with access to the Agent Console.
Currently, the recommended approach for CVE-2024-25157 is to upgrade to the patched version, as there are no known effective workarounds.