
CVE-2025-10035 Scanner
CVE-2025-10035 Scanner - Insecure Deserialization vulnerability in GoAnywhere
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
23 days
Scan only one
URL
Toolbox
-
The scanner checks the GoAnywhere MFT software for vulnerabilities. GoAnywhere is used by organizations for secure file transfers, ensuring data is exchanged securely between systems and partners. Administrators and IT departments primarily utilize it to automate and manage file transfers in a secure environment. Its adaptability makes it an essential tool in various industries, supporting multiple protocols for seamless interoperability. Maintaining the security and efficiency of file transfers is crucial for businesses that rely on the uninterrupted flow of information. Users depend on GoAnywhere to prevent unauthorized access and data leaks during these transfers.
The vulnerability detected is an insecure deserialization issue within GoAnywhere's License Servlet. This flaw arises when attacker-controlled objects are deserialized, potentially leading to command injection. An attacker can exploit this by providing a valid forged license response signature, which the system deserializes without proper validation. As a result, it presents a critical security risk by potentially allowing remote code execution. Once exploited, this vulnerability could lead to unauthorized access and control over the system.
Technical details involve the vulnerable endpoints being susceptible to deserializing untrusted inputs with attacker-crafted signatures. The exploitation process requires attackers to identify and interact with specific endpoints, such as `/goanywhere/license/Unlicensed.xhtml` or `/license/Unlicensed.xhtml`, using specially crafted requests. These requests may manipulate parameters like `javax.faces.ViewState` and `GARequestAction` to trigger the deserialization flaw. Successful exploitation is apparent when the server redirection includes specific indicators, suggesting vulnerable behavior.
Exploiting this vulnerability could result in severe consequences. Attackers could execute arbitrary commands on the affected system, leading to a complete system compromise. This can jeopardize data integrity and allow unauthorized access to sensitive information. Furthermore, it could disrupt operations, resulting in downtime and significant operational impact. As a result, it emphasizes the importance of addressing this vulnerability promptly to avoid exploitation.
REFERENCES