HomeMalware & ThreatsFortra GoAnywhere MFT – Vulnerability Allows Unauthenticated Remote Code Execution

Fortra GoAnywhere MFT – Vulnerability Allows Unauthenticated Remote Code Execution

Published on

spot_img

A vulnerability within the Fortra GoAnywhere MFT has been discovered, allowing an unauthenticated attacker to create a new administrator account and potentially execute remote code. Specifically, this vulnerability affects GoAnywhere MFT versions 6.x from 6.0.1, as well as 7.x before 7.4.1. Exploiting this vulnerability would enable an attacker to upload a JSP payload and subsequently achieve remote code execution.

The Metasploit module has been crafted to exploit this vulnerability. The module itself is incredibly versatile, featuring various functionalities such as an automatic check and an auxiliary report that observes the stability, reliability, and side effects of the exploit.

Upon initialization, the module uses a series of targets and options to determine the best approach for exploitation. It checks for the presence of the unauthenticated REST API endpoint and extracts the version number to confirm the presence of the vulnerability. Upon successful confirmation, the module is capable of creating a new administrator account and storing the required credentials.

Additionally, the module effectively targets the appropriate operating system and product installation directory, making use of the about.xhtml page to gather essential information required for the exploit. The presence of a JSP payload is crucial in this process, as the module is designed to upload this payload to a specific directory within the target system. The exploit also automatically creates and stores the JSP payload, ensuring that it is deleted after generating a session.

Although the automatic targeting and payload upload processes are carefully handled by the module, it is important to note that it is not feasible to delete the user account created as a part of the exploit. This limitation is due to restrictions within the web interface or REST API.

Furthermore, the module provides functionalities to manage and store credentials, logging pertinent information and encrypting data to ensure secure storage. This helps in maintaining a record of the exploitation activities and their outcomes, adding a layer of accountability and traceability within the exploit environment.

Overall, the Metasploit module for the Fortra GoAnywhere MFT Unauthenticated Remote Code Execution vulnerability is a comprehensive and sophisticated tool for identifying, exploiting, and managing the intricacies of this security flaw. It provides convenience and a high degree of automation, making it an effective solution for security professionals in detecting and addressing vulnerabilities within the GoAnywhere MFT software.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...