-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fortra deserialization RCE CVE-2023-0669 (ETR) #17607
Fortra deserialization RCE CVE-2023-0669 (ETR) #17607
Conversation
modules/exploits/linux/http/fortra_goanywhere_rce_cve_2023_0669.rb
Outdated
Show resolved
Hide resolved
modules/exploits/linux/http/fortra_goanywhere_rce_cve_2023_0669.rb
Outdated
Show resolved
Hide resolved
Thanks, Spencer! Fixed both of those comments |
Use CamelCase names for advaned options and add validation.
Pr/collab/17607
Your changes are great, and work fine. Thanks! Merged in |
Working like a champ on windows and linux now. I'll get this landed in a second. Testing Output
|
CVE-2023-0669 references updated. |
Nice work, however I think it’s fair to put Fryco as a reference since he found it in 2021: https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html |
Oh yeah, not a bad idea! I put him on the AttackerKB already |
Oh for sure! Done. |
Please check the documentation. |
Release NotesThis adds an exploit targeting CVE-2023-0669, a pre-authentication deserialization that effects Fortra GoAnywhere MFT. |
Verification
List the steps needed to make sure this thing works
msfconsole
use exploit/linux/http/fortra_goanywhere_rce_cve_2023_0669
set LHOST
/set RHOST
/exploit
I included a documentation file with lots of info / examples. LMK if you need the software (a copy should be on our vulnerable software drive).
Cheers!