{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-0669", "ASSIGNER": "cve@rapid7.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data", "cweId": "CWE-502" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Fortra", "product": { "product_data": [ { "product_name": "Goanywhere MFT", "version": { "version_data": [ { "version_affected": "<=", "version_name": "0", "version_value": "7.1.1" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1", "refsource": "MISC", "name": "https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1" }, { "url": "https://infosec.exchange/@briankrebs/109795710941843934", "refsource": "MISC", "name": "https://infosec.exchange/@briankrebs/109795710941843934" }, { "url": "https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/", "refsource": "MISC", "name": "https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/" }, { "url": "https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis", "refsource": "MISC", "name": "https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis" }, { "url": "https://github.com/rapid7/metasploit-framework/pull/17607", "refsource": "MISC", "name": "https://github.com/rapid7/metasploit-framework/pull/17607" }, { "url": "https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft", "refsource": "MISC", "name": "https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft" }, { "url": "https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html", "refsource": "MISC", "name": "https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html" }, { "url": "http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "discovery": "UNKNOWN" }, "credits": [ { "lang": "en", "value": "Brian Krebs of Krebs on Security" }, { "lang": "en", "value": "Ron Bowes of Rapid7" }, { "lang": "en", "value": "Caitlin Condon of Rapid7" }, { "lang": "en", "value": "Fryco of Frycos Security" } ] }