QID 730720

Date Published: 2023-02-07

QID 730720: GoAnywhere Managed File Transfer (MFT) Remote Code Execution (RCE) Vulnerability

A Zero-Day Remote Code Injection exploit was identified in GoAnywhere MFT. The attack vector of this exploit requires access to the administrative console of the application, which in most cases is accessible only from within a private company network, through VPN, or by allow-listed IP addresses (when running in cloud environments, such as Azure or AWS).

Affected Versions:
All versions of GoAnywhere MFT prior to version 7.1.2

QID Detection Logic (Unauhtenticated):
This QID checks for vulnerable version of GoAnywhere MFT by sending a GET request to the 'goanywhere/auth/Login.xhtml' endpoint and fetching the version from the response received.

Successful exploitation of the vulnerability may allow a remote attacker to execute arbitrary commands remotely, leading to complete system compromise.

  • CVSS V3 rated as High - 7.2 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    There are no patched versions as of now, however customers are advised to apply the mitigations mentioned hereWorkaround:
    Vendor has released patch, customers are advised to upgrade to version 7.1.2 or later to patch the vulnerability. For more information please refer to the GoAnywhere MFT Security Advisory

    Vendor References

    CVEs related to QID 730720

    Software Advisories
    Advisory ID Software Component Link
    GoAnywhere Security Advisory URL Logo my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml