First published: Wed Mar 13 2024(Updated: )
A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
Fortra FileCatalyst Workflow | <5.1.6 | |
Fortra FileCatalyst Workflow | >=5.0<5.1.6 | |
Fortra FileCatalyst Workflow | =5.1.6-build112 |
Upgrade to FileCatalyst 5.1.6 Build 114 or later to remediate this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.