First published: Wed Mar 13 2024(Updated: )
In FileCatalyst Direct 3.8.8 and earlier through 3.8.6, the web server does not properly sanitize illegal characters in a URL which is then displayed on a subsequent error page. A malicious actor could craft a URL which would then execute arbitrary code within an HTML script tag.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
Fortra FileCatalyst Direct | >=3.8.6<3.8.8 | |
Fortra FileCatalyst Direct | >=3.0.0<3.8.9 |
Upgrade FileCatalyst to version 3.8.9 or later to remediate the XSS vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.