Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Fortra | Goanywhere MFT | 0 ~ 7.1.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. | https://github.com/0xf4n9x/CVE-2023-0669 | POC Details |
| 2 | CVE-2023-0669 GoAnywhere MFT command injection vulnerability | https://github.com/cataliniovita/CVE-2023-0669 | POC Details |
| 3 | None | https://github.com/Griffin-01/CVE-2023-0669 | POC Details |
| 4 | CVE analysis for CVE-2023-0669 | https://github.com/yosef0x01/CVE-2023-0669-Analysis | POC Details |
| 5 | GoAnywhere MFT CVE-2023-0669 LicenseResponseServlet Deserialization Vulnerabilities Python RCE PoC(Proof of Concept) | https://github.com/Avento/CVE-2023-0669 | POC Details |
| 6 | Fortra GoAnywhere MFT is susceptible to remote code execution via unsafe deserialization of an arbitrary attacker-controlled object. This stems from a pre-authentication command injection vulnerability in the License Response Servlet. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-0669.yaml | POC Details |
| 7 | None | https://github.com/zakaria-laouani/cve-2023-0669-simulation | POC Details |
No public POC found.
Login to generate AI POCNo comments yet