Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.FORTRA_GOANYWHERE_MFT_CVE-2024-0204.NBIN
HistoryJan 23, 2024 - 12:00 a.m.

Fortra GoAnywhere Managed File Transfer (MFT) < 7.4.1 Authentication Bypass (CVE-2024-0204)

2024-01-2300:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12
managed file transfer
authentication bypass
binary data
scanner
cve-2024-0204

7.2 High

AI Score

Confidence

Low

According to its self-reported version, the instance of Fortra GoAnywhere Managed File Transfer (MFT) running on the remote web server is < 7.4.1. It is, therefore, affected by an authentication bypass vulnerability. This can allow an unauthenticated attacker to create an admin user via the administration portal.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

Binary data fortra_goanywhere_mft_CVE-2024-0204.nbin
VendorProductVersionCPE
helpsystemsgoanywhere_managed_file_transfercpe:/a:helpsystems:goanywhere_managed_file_transfer