{"id":50344,"date":"2024-01-26T09:07:32","date_gmt":"2024-01-26T14:07:32","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=50344"},"modified":"2024-01-26T09:07:32","modified_gmt":"2024-01-26T14:07:32","slug":"exploit-authentication-bypass-vulnerability-goanywhere-mft","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/50344\/","title":{"rendered":"Critical vulnerability exploit in GoAnywhere MFT"},"content":{"rendered":"<p>Researchers have <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/exploit-released-for-fortra-goanywhere-mft-auth-bypass-bug\/\" target=\"_blank\" rel=\"nofollow noopener\">analyzed<\/a> the CVE-2024-0204 vulnerability in <em>Fortra GoAnywhere MFT<\/em> software (MFT standing for managed file transfer) and published exploit code that takes advantage of it. We explain the danger, and what organizations that use this software should do about it.<\/p>\n<h2>Vulnerability CVE-2024-0204 in GoAnywhere MFT<\/h2>\n<p>Let\u2019s start by briefly recounting the story of this vulnerability in GoAnywhere. In fact, Fortra, the company developing this solution, patched this vulnerability back in early December 2023 with the release of GoAnywhere MFT 7.4.1. However, at that time the company chose not to disclose any information about the vulnerability, limiting itself to sending private recommendations to clients.<\/p>\n<p>The essence of the vulnerability is as follows. After a user completes initial setup of GoAnywhere, the product\u2019s internal logic blocks access to the initial account setup page. Then when they attempt to access this page, they\u2019re redirected either to the admin panel (if they\u2019re authenticated as an administrator) or to the authentication page.<\/p>\n<p>However, researchers discovered that an alternative path to the InitialAccountSetup.xhtml file can be used, which the redirection logic does not take into account. In this scenario, GoAnywhere MFT allows anyone to access this page and create a new user account with administrator privileges.<\/p>\n<p>As proof of the attack\u2019s feasibility, the researchers wrote and published a short script that can create admin accounts in vulnerable versions of GoAnywhere MFT. All an attacker needs is to specify a new account name, a password (the only requirement is that it contains at least eight characters, which is interesting in itself), and the path:<\/p>\n<div id=\"attachment_50345\" style=\"width: 1936px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/01\/26085532\/exploit-authentication-bypass-vulnerability-goanywhere-mft-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50345\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/01\/26085532\/exploit-authentication-bypass-vulnerability-goanywhere-mft-1.png\" alt=\"Part of the exploit code for the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT\" width=\"1926\" height=\"688\" class=\"size-full wp-image-50345\"><\/a><p id=\"caption-attachment-50345\" class=\"wp-caption-text\">Part of the exploit code for the CVE-2024-0204 vulnerability. Highlighted in red is the alternative path to the initial account setup page that enables the creation of users with administrator privileges<\/p><\/div>\n<p>In general, this vulnerability closely resembles that discovered in Atlassian Confluence Data Center and Confluence Server a few months ago; there, too, it was possible to create admin accounts in a few simple steps.<\/p>\n<p>Fortra assigned vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-0204\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-0204<\/a> \u201ccritical\u201d status, with a CVSS 3.1 score of 9.8 out of 10.<\/p>\n<p>A little context is necessary here. In 2023, the Clop ransomware group already exploited vulnerabilities in Fortra GoAnywhere MFT and also similar products from other developers \u2014 <a href=\"https:\/\/www.kaspersky.com\/blog\/moveit-transfer-attack-protection\/48598\/\" target=\"_blank\" rel=\"noopener nofollow\">Progress MOVEit<\/a>, Accellion FTA, and SolarWinds Serv-U \u2014 to attack hundreds of organizations worldwide. In particular, companies such as Procter &amp; Gamble, Community Health Systems (CHS, one of the largest hospital networks in the U.S.A.), and the municipality of Toronto suffered from the exploitation of the GoAnywhere MFT vulnerability.<\/p>\n<h2>How to defend against CVE-2024-0204 exploitation<\/h2>\n<p>The obvious way to protect against exploitation of this vulnerability is to update GoAnywhere MFT to version 7.4.1 immediately, which fixes the logic for denying access to the InitialAccountSetup.xhtml page.<\/p>\n<p>If you can\u2019t install the update for some reason, you can try one of two simple workarounds:<\/p>\n<ul>\n<li>Delete the InitialAccountSetup.xhtml file in the installation folder and restart the service;<\/li>\n<\/ul>\n<p>or<\/p>\n<ul>\n<li>Replace InitialAccountSetup.xhtml with a blank file and restart the service.<\/li>\n<\/ul>\n<p>You should also use an <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">EDR (Endpoint Detection and Response) solution<\/a> to monitor suspicious activity in the corporate network. If your internal cybersecurity team lacks the skills or resources for this, you can use an <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\" rel=\"noopener nofollow\">external service<\/a> to continuously hunt for threats to your organization and swiftly respond to them.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.<\/p>\n","protected":false},"author":2726,"featured_media":50346,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[2141,527,961,4486,420,1146,422,268],"class_list":{"0":"post-50344","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-business","10":"tag-hacks","11":"tag-leaks","12":"tag-mft","13":"tag-ransomware","14":"tag-risks","15":"tag-threats","16":"tag-vulnerabilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/50344\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/27008\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/22323\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/29681\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/27179\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/26995\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/29584\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/28435\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/36891\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/21422\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/22178\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/30861\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/33195\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/exploit-authentication-bypass-vulnerability-goanywhere-mft\/32819\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/vulnerabilities\/","name":"vulnerabilities"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=50344"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50344\/revisions"}],"predecessor-version":[{"id":50348,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50344\/revisions\/50348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50346"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=50344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=50344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}