CVE-2023-0669
📋 TL;DR
CVE-2023-0669 is a pre-authentication remote code execution vulnerability in Fortra GoAnywhere MFT that allows unauthenticated attackers to execute arbitrary commands on affected systems by exploiting insecure deserialization in the License Response Servlet. This affects organizations using GoAnywhere MFT versions before 7.1.2 for secure file transfers. Attackers can gain complete control of vulnerable systems without requiring valid credentials.
💻 Affected Systems
- Fortra GoAnywhere MFT
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data exfiltration, ransomware deployment, lateral movement within the network, and persistent backdoor installation.
Likely Case
Unauthenticated remote code execution allowing attackers to deploy malware, steal sensitive data, and use the system as a foothold for further attacks.
If Mitigated
Limited impact if network segmentation, strict firewall rules, and intrusion detection systems prevent exploitation attempts.
🎯 Exploit Status
Metasploit module available, actively exploited in the wild, and exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.1.2
Vendor Advisory: https://www.fortra.com/security/advisory/fi-2023-005
Restart Required: Yes
Instructions:
1. Backup current configuration and data. 2. Download GoAnywhere MFT 7.1.2 from Fortra support portal. 3. Stop GoAnywhere services. 4. Install the update following vendor documentation. 5. Restart services and verify functionality.
🔧 Temporary Workarounds
Network Isolation
allBlock external access to GoAnywhere MFT web interface (default port 8000/8001) at network perimeter.
Disable License Response Servlet
allRemove or disable the vulnerable servlet if not required for functionality.
# Remove LicenseResponseServlet from web.xml configuration
🧯 If You Can't Patch
- Implement strict network segmentation to isolate GoAnywhere MFT from internet and critical internal networks
- Deploy web application firewall (WAF) with rules to detect and block exploitation attempts targeting deserialization
🔍 How to Verify
Check if Vulnerable:
Check GoAnywhere MFT version via admin interface or by examining installation directory for version files.
Check Version:
# On Linux: cat /usr/local/goanywhere/version.txt or check web interface at https://<host>:8000/admin
Verify Fix Applied:
Verify version shows 7.1.2 or later in admin interface and test that License Response Servlet no longer accepts malicious payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to /goanywhere/images/..;/license response endpoint
- Java deserialization errors in application logs
- Unexpected process execution from GoAnywhere service account
Network Indicators:
- HTTP POST requests to /goanywhere/images/..;/license with serialized Java objects
- Outbound connections from GoAnywhere server to suspicious external IPs
SIEM Query:
source="goanywhere.logs" AND (uri="/goanywhere/images/..;/license" OR message="*deserialization*" OR message="*LicenseResponseServlet*")
🔗 References
- http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html
- https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
- https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft
- https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
- https://github.com/rapid7/metasploit-framework/pull/17607
- https://infosec.exchange/@briankrebs/109795710941843934
- https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1
- https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/
- http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html
- https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
- https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft
- https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
- https://github.com/rapid7/metasploit-framework/pull/17607
- https://infosec.exchange/@briankrebs/109795710941843934
- https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1
- https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-0669