vendor:
GoAnywhere Encryption Helper
by:
Youssef Muhammad
7.2
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: GoAnywhere Encryption Helper
Affected Version From: 7.1.1 for windows / 7.0.3 for Linux
Affected Version To: 7.1.1 for windows / 7.0.3 for Linux
Patch Exists: YES
Related CWE: CVE-2023-0669
CPE: a:goanywhere:goanywhere_encryption_helper
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=65652, https://www.infosecmatter.com/nessus-plugin-library/?id=65661, https://www.infosecmatter.com/nessus-plugin-library/?id=68795, https://www.infosecmatter.com/nessus-plugin-library/?id=71073, https://www.infosecmatter.com/nessus-plugin-library/?id=64638, https://www.infosecmatter.com/nessus-plugin-library/?id=24887, https://www.infosecmatter.com/nessus-plugin-library/?id=65567, https://www.infosecmatter.com/nessus-plugin-library/?id=64868, https://www.infosecmatter.com/nessus-plugin-library/?id=29376, https://www.infosecmatter.com/nessus-plugin-library/?id=27942
Tags: cve,cve2023,rce,goanywhere,oast,kev
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html, https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1, https://infosec.exchange/@briankrebs/109795710941843934, https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/, https://nvd.nist.gov/vuln/detail/CVE-2023-0669
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.favicon.hash:1484947000', 'verified': True, 'vendor': 'fortra', 'product': 'goanywhere_managed_file_transfer'}
Platforms Tested: Windows, Linux
2023
Goanywhere Encryption helper 7.1.1 – Remote Code Execution (RCE)
This script is needed to encrypt the serialized payload generated by the ysoserial tool in order to achieve Remote Code Execution.
Mitigation:
Ensure that the encryption helper is up to date and that all security patches are applied.