cve/2023/CVE-2023-0669.md

47 lines
2.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-0669](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0669)
![](https://img.shields.io/static/v1?label=Product&message=Goanywhere%20MFT&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%207.1.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
### POC
#### Reference
- http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html
2024-05-25 21:48:12 +02:00
- https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
2024-06-09 00:33:16 +00:00
- https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
2024-05-25 21:48:12 +02:00
- https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
2024-06-09 00:33:16 +00:00
- https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/0xf4n9x/CVE-2023-0669
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Avento/CVE-2023-0669
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/H4lo/awesome-IoT-security-article
2024-05-28 08:49:17 +00:00
- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection
2024-05-25 21:48:12 +02:00
- https://github.com/Loginsoft-Research/Linux-Exploit-Detection
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/aneasystone/github-trending
- https://github.com/cataiovita/CVE-2023-0669
- https://github.com/cataliniovita/CVE-2023-0669
- https://github.com/hktalent/TOP
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
- https://github.com/trhacknon/CVE-2023-0669
- https://github.com/trhacknon/CVE-2023-0669-bis
2024-05-28 08:49:17 +00:00
- https://github.com/whoforget/CVE-POC
2024-05-25 21:48:12 +02:00
- https://github.com/yosef0x01/CVE-2023-0669-Analysis
2024-05-28 08:49:17 +00:00
- https://github.com/youwizard/CVE-POC
2024-05-25 21:48:12 +02:00