First published: Tue Jun 25 2024(Updated: )
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data. Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
Fortra FileCatalyst Workflow | >5.1.6 | |
Fortra FileCatalyst Workflow | <5.1.6 | |
Fortra FileCatalyst Workflow | =5.1.6 | |
Fortra FileCatalyst Workflow | =5.1.6-build112 | |
Fortra FileCatalyst Workflow | =5.1.6-build114 | |
Fortra FileCatalyst Workflow | =5.1.6-build126 | |
Fortra FileCatalyst Workflow | =5.1.6-build130 | |
Fortra FileCatalyst Workflow | =5.1.6-build135 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5276 is classified as a significant SQL Injection vulnerability that allows attackers to modify application data in Fortra FileCatalyst Workflow.
To fix CVE-2024-5276, it's recommended to apply patches or updates provided by Fortra for vulnerable versions of FileCatalyst Workflow.
CVE-2024-5276 affects Fortra FileCatalyst Workflow version 5.1.6 and earlier.
The potential impacts of CVE-2024-5276 include unauthorized creation of administrative users and the deletion or modification of data within the application database.
Data exfiltration via SQL injection is not possible with CVE-2024-5276, focusing mainly on modification of existing data.