CVE-2024-0204

9.8 CRITICAL

📋 TL;DR

This vulnerability allows an unauthenticated attacker to bypass authentication in Fortra's GoAnywhere MFT and create an administrative user via the administration portal. This affects all GoAnywhere MFT installations prior to version 7.4.1. The attacker gains full administrative control over the MFT system.

💻 Affected Systems

Products:
  • Fortra GoAnywhere MFT
Versions: All versions prior to 7.4.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with the administration portal accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the MFT system leading to data exfiltration, ransomware deployment, lateral movement to connected systems, and persistent backdoor access.

🟠

Likely Case

Unauthorized administrative access leading to data theft, manipulation of file transfers, and potential credential harvesting from the MFT system.

🟢

If Mitigated

Limited impact if system is isolated with strict network controls, but administrative access still compromised.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication from internet-facing interfaces.
🏢 Internal Only: HIGH - Even internally, any network access to the administration portal allows exploitation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Packet Storm. Exploitation requires network access to administration portal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1

Vendor Advisory: https://www.fortra.com/security/advisory/fi-2024-001

Restart Required: Yes

Instructions:

1. Download GoAnywhere MFT 7.4.1 from Fortra support portal. 2. Backup current installation. 3. Stop GoAnywhere services. 4. Apply the update. 5. Restart services. 6. Verify version is 7.4.1.

🔧 Temporary Workarounds

Network Isolation

all

Restrict access to GoAnywhere administration portal to trusted IP addresses only.

Disable Administration Portal

all

Temporarily disable the administration portal interface if not required.

🧯 If You Can't Patch

  • Immediately restrict network access to GoAnywhere administration portal using firewall rules
  • Implement additional authentication layer (VPN, reverse proxy with MFA) in front of administration portal

🔍 How to Verify

Check if Vulnerable:

Check GoAnywhere version via administration portal or system logs. If version is below 7.4.1, system is vulnerable.

Check Version:

Check version in GoAnywhere administration portal under Help > About or examine installation directory version files.

Verify Fix Applied:

Verify version shows 7.4.1 in administration portal and attempt to reproduce exploit steps (create admin user without auth) fails.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to administration portal endpoints
  • Unexpected admin user creation events
  • Authentication bypass attempts in access logs

Network Indicators:

  • Unusual traffic to /goanywhere/admin endpoints from unauthorized sources
  • POST requests to user creation endpoints without prior authentication

SIEM Query:

source="goanywhere" AND (uri_path="/goanywhere/admin/*" AND http_status=200) AND NOT (src_ip IN [trusted_ips])

🔗 References

📤 Share & Export