First published: Wed Mar 13 2024(Updated: )
In FileCatalyst Direct 3.8.8 and earlier through 3.8.6, the web server does not properly sanitize illegal characters in a URL which is then displayed on a subsequent error page. A malicious actor could craft a URL which would then execute arbitrary code within an HTML script tag.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
Fortra FileCatalyst Direct | >=3.8.6<3.8.8 | |
Fortra FileCatalyst Direct | >=3.0.0<3.8.9 |
Upgrade FileCatalyst to version 3.8.9 or later to remediate the XSS vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25155 is rated as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-25155, upgrade to FileCatalyst Direct version 3.8.9 or later.
CVE-2024-25155 affects FileCatalyst Direct versions from 3.8.6 to 3.8.8.
CVE-2024-25155 is a cross-site scripting (XSS) vulnerability that involves improper URL sanitization.
Yes, CVE-2024-25155 can be exploited remotely by a malicious actor crafting a specific URL.