POC详情: 2500e117a99b5182a219dd1f6a54b7058a098325

来源
关联漏洞
标题: Fortra GoAnywhere MFT 安全漏洞 (CVE-2024-0204)
描述:Fortra GoAnywhere MFT是美国Fortra公司的一种安全的文件传输解决方案。 Fortra GoAnywhere MFT 7.4.1之前版本存在安全漏洞。攻击者利用该漏洞绕过身份验证,从而通过管理门户创建管理员用户。
描述
This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes.
介绍
# CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive

This repository contains a proof-of-concept exploit for the authentication bypass vulnerability (CVE-2024-0204) discovered in Fortra's GoAnywhere MFT product. The vulnerability allows an unauthenticated attacker to create an administrative user for the application.

# Description

On December 4, 2023, an internal security advisory was posted by Fortra, highlighting an authentication bypass vulnerability (CVE-2024-0204) in GoAnywhere MFT. The vulnerability enables an unauthenticated attacker to create an administrative user for the application. The discovery was credited to researchers malcolm0x and Islam Elrfai.

# Exploit Overview
The exploit involves manipulating the /..; path traversal technique to bypass the SecurityFilter class and gain unauthorized access to the /wizard/InitialAccountSetup.xhtml endpoint.

# Usage

```
python CVE-2024-0204.py --ip <TARGET_IP>
```
or
```
python CVE-2024-0204.py --targets <TARGETS_FILE_PATH>
```
+ Replace <TARGET_IP> with the specific target IP or URL you want to test.
+ Replace <TARGETS_FILE_PATH> with the path to a file containing a list of target IPs or URLs (one per line).

This will run the script to check if the specified targets are vulnerable to the CVE-2024-0204 GoAnywhere MFT authentication bypass. The script will attempt to create an administrative user and print the result for each target. If successful, it will provide the created admin user's details (username and password).

# Disclaimer
This script is provided for educational and research purposes only. Unauthorized use of this script on systems or networks without explicit permission is strictly prohibited. The author and the organization (if any) associated with this script are not responsible for any misuse or damage caused by its usage. Users are advised to obtain proper authorization before testing or using this script on any system, network, or application.

By using this script, you agree that you are solely responsible for ensuring compliance with applicable laws and regulations. Any unauthorized access, testing, or exploitation may result in legal consequences.

Use at your own risk and only on systems where you have explicit authorization.

# Indicators of Compromise
Admin Users Group: Check for new additions in the GoAnywhere administrator portal under Users -> Admin Users.
Database Logs: Examine transactional history logs at \GoAnywhere\userdata\database\goanywhere\log\*.log.

# Mitigation
The advisory suggests deleting the /InitialAccountSetup.xhtml endpoint and restarting the service. This mitigates the vulnerability.
文件快照

[4.0K] /data/pocs/2500e117a99b5182a219dd1f6a54b7058a098325 ├── [4.4K] CVE-2024-0204.py └── [2.6K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。