First published: Wed Mar 13 2024(Updated: )
Improper URL validation leads to path traversal in FileCatalyst Direct 3.8.8 and earlier allowing an encoded payload to cause the web server to return files located outside of the web root which may lead to data leakage.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
Fortra FileCatalyst Direct | <3.8.8 | |
Fortra FileCatalyst Direct | >=3.0.0<3.8.9 |
Upgrade FileCatalyst to version 3.8.9 or later to remediate the path traversal vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-25154 can be classified as high due to the potential for data leakage via improper URL validation.
To fix CVE-2024-25154, users should upgrade to FileCatalyst Direct version 3.8.9 or later.
CVE-2024-25154 is associated with a path traversal exploit that can return files outside of the web root.
CVE-2024-25154 affects FileCatalyst Direct versions 3.8.8 and earlier.
Exploiting CVE-2024-25154 may lead to unauthorized access to sensitive files, resulting in potential data leakage.