2024-05-25 21:48:12 +02:00
### [CVE-2023-0669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0669)



### Description
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
### POC
#### Reference
- http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html
- https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
- https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
#### Github
- https://github.com/0xf4n9x/CVE-2023-0669
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Avento/CVE-2023-0669
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/H4lo/awesome-IoT-security-article
2024-05-28 08:49:17 +00:00
- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection
2024-05-25 21:48:12 +02:00
- https://github.com/Loginsoft-Research/Linux-Exploit-Detection
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/aneasystone/github-trending
- https://github.com/cataiovita/CVE-2023-0669
- https://github.com/cataliniovita/CVE-2023-0669
- https://github.com/hktalent/TOP
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
- https://github.com/trhacknon/CVE-2023-0669
- https://github.com/trhacknon/CVE-2023-0669-bis
2024-05-28 08:49:17 +00:00
- https://github.com/whoforget/CVE-POC
2024-05-25 21:48:12 +02:00
- https://github.com/yosef0x01/CVE-2023-0669-Analysis
2024-05-28 08:49:17 +00:00
- https://github.com/youwizard/CVE-POC
2024-05-25 21:48:12 +02:00