### [CVE-2024-0204](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0204) ![](https://img.shields.io/static/v1?label=Product&message=GoAnywhere%20MFT&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-425%20Direct%20Request%20('Forced%20Browsing')&color=brighgreen) ### Description Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal. ### POC #### Reference - http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html - http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html #### Github - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/Ostorlab/KEV - https://github.com/Threekiii/CVE - https://github.com/adminlove520/CVE-2024-0204 - https://github.com/cbeek-r7/CVE-2024-0204 - https://github.com/gobysec/Goby - https://github.com/horizon3ai/CVE-2024-0204 - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/m-cetin/CVE-2024-0204 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/toxyl/lscve