Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to version 7.4.1 or higher. The vulnerability may also be eliminated in non-container deployments by deleting the InitialAccountSetup.xhtml file in the install directory and restarting the services. For container-deployed instances, replace the file with an empty file and restart. For additional information, see  https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml  (registration required). https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml


Workaround

Users are encouraged to apply defense-in-depth tactics to limit access to the administrative console. Do not expose the console to the internet and apply web application controls such as a WAF, monitoring, and access controls.

History

Fri, 30 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Fortra

Published:

Updated: 2025-05-30T14:22:31.288Z

Reserved: 2024-01-03T00:12:28.436Z

Link: CVE-2024-0204

cve-icon Vulnrichment

Updated: 2024-08-01T17:41:15.984Z

cve-icon NVD

Status : Modified

Published: 2024-01-22T18:15:20.137

Modified: 2024-11-21T08:46:03.627

Link: CVE-2024-0204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.