QID 730720
Date Published: 2023-02-07
QID 730720: GoAnywhere Managed File Transfer (MFT) Remote Code Execution (RCE) Vulnerability
A Zero-Day Remote Code Injection exploit was identified in GoAnywhere MFT. The attack vector of this exploit requires access to the administrative console of the application, which in most cases is accessible only from within a private company network, through VPN, or by allow-listed IP addresses (when running in cloud environments, such as Azure or AWS).
Affected Versions:
All versions of GoAnywhere MFT prior to version 7.1.2
QID Detection Logic (Unauhtenticated):
This QID checks for vulnerable version of GoAnywhere MFT by sending a GET request to the 'goanywhere/auth/Login.xhtml' endpoint and fetching the version from the response received.
Successful exploitation of the vulnerability may allow a remote attacker to execute arbitrary commands remotely, leading to complete system compromise.
Vendor has released patch, customers are advised to upgrade to version 7.1.2 or later to patch the vulnerability. For more information please refer to the GoAnywhere MFT Security Advisory
- GoAnywhere Security Advisory -
my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml
CVEs related to QID 730720
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GoAnywhere Security Advisory |
|