First published: Wed Mar 13 2024(Updated: )
A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
Fortra FileCatalyst Workflow | <5.1.6 | |
Fortra FileCatalyst Workflow | >=5.0<5.1.6 | |
Fortra FileCatalyst Workflow | =5.1.6-build112 |
Upgrade to FileCatalyst 5.1.6 Build 114 or later to remediate this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25153 is considered a critical vulnerability due to its potential for unauthorized file uploads.
To mitigate CVE-2024-25153, upgrade to FileCatalyst Workflow version 5.1.6 or higher to ensure the vulnerability is patched.
CVE-2024-25153 affects FileCatalyst Workflow versions up to and including 5.1.6.
CVE-2024-25153 exploits a directory traversal vulnerability in the 'ftpservlet' of the FileCatalyst Workflow Web Portal.
Yes, incidents related to CVE-2024-25153 should be reported directly to the vendor, Fortra.