Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: New Critical Vulnerability Found in GoAnywhere MFT Allows Admin Creation
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

New Critical Vulnerability Found in GoAnywhere MFT Allows Admin Creation

Highlights

  • A critical vulnerability in GoAnywhere MFT was found.

  • Forta issued an advisory with patches and workarounds.

  • Researchers published a proof-of-concept for the exploit.

NEWSLINKER
Last updated: 24 January, 2024 - 2:29 pm 2:29 pm
NEWSLINKER 1 year ago
Share
SHARE

A newly identified vulnerability within the GoAnywhere Managed File Transfer software, owned by Fortra, raises significant security concerns. This flaw, known as CVE-2024-0204, carries a critical severity rating of 9.8 and enables unauthorized individuals to generate admin users through the platform’s administration panel.

Contents
Security Measures and Vulnerability DetailsInvestigation and Proof-of-ConceptExploitation Tactics and Indicators

Security Measures and Vulnerability Details

In response, Fortra has issued a security advisory which states that versions 6.x starting from 6.0.1 up to 7.x prior to 7.4.1 of the GoAnywhere MFT are impacted. The company categorizes the issue as an authentication bypass vulnerability and provides guidance for remediation.

Further scrutiny reveals that a particular endpoint, /InitialAccountSetup.xhtml, is associated with the vulnerability. After initial admin account setup, this endpoint should become inaccessible, redirecting users to other authenticated areas of the application.

Investigation and Proof-of-Concept

Researchers have actively recreated the exploit and shared a proof-of-concept on GitHub. The vulnerability lies within the application’s security filter mechanisms, which fail to properly restrict access to the initial account setup endpoint under certain conditions.

Two specific points in the code allow for the security bypass, with one redirecting users to the setup page and the other to the dashboard, depending on whether an admin user exists and the requested path.

Exploitation Tactics and Indicators

Exploitation involves the use of path traversal techniques, which allow attackers to reach the setup page and subsequently create a new admin user. A comprehensive report by Horizon3 delves into the source code and exploitation process.

To detect possible breaches, administrators should monitor for newly created admin users and review database logs for unusual activities. These steps are crucial in identifying and mitigating the risks posed by this critical vulnerability.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CIOs Tackle Quantum Threat in Encryption Race

FTC Seeks New Tools to Combat Deepfake Pornography

Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure

North Korea Builds Cyber Network Resembling a Mafia Operation

Cybercriminals Invest Illicit Profits in Surprising Ventures

Share This Article
Facebook Twitter Copy Link Print
By NEWSLINKER
NEWS LINKER is your premier source for the latest in business, finance, science, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Dive deep into the world of cutting-edge developments, breakthroughs, market trends, and game-changing innovations..
Previous Article Call of Duty’s Anti-Toxicity System Flags Over Two Million Accounts
Next Article Enhanced Nintendo Switch Play with Hori’s Discounted Split Pad Compact

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Conquer Wordle Challenges with Expert Tips Today
Gaming
Ekso Bionics Joins NVIDIA for Advanced AI in Exoskeleton Tech
Robotics
Master Wordle Strategy with these Unbeatable Tips
Gaming
RealMan Robotics Unveils Innovative Automation at Automate 2025
Robotics
Nvidia RTX 5060 Surprises with Performance and Price
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?