A PoC has been published for a critical RCE vulnerability found in Fortra’s FileCatalyst software.
RCE Vulnerability in Fortra FileCatalyst
Tracked as CVE-2024-25153, this vulnerability poses a severe threat to organizations using the FileCatalyst Workflow Web Portal, potentially allowing attackers to execute arbitrary code on affected systems.
CVE-2024-25153
The vulnerability resides in a directory traversal flaw within the ‘ftpservlet’ component of the FileCatalyst Workflow Web Portal.
By exploiting this flaw, attackers can circumvent intended security measures by using a specially crafted POST request to upload files outside the designated ‘uploadtemp’ directory.
If an attacker successfully uploads a file to the web portal’s DocumentRoot, they could use specially crafted JSP files to execute arbitrary code on the server, potentially deploying web shells for persistent access and control.
This vulnerability has been assigned a CVSSv3.1 score of 9.8, categorizing it as critical due to its potential impact on confidentiality, integrity, and availability.
Fortran has addressed this vulnerability by releasing an update for FileCatalyst Workflow. Users are urged to upgrade to version 5.1.6 Build 114 or higher to mitigate the risk associated with CVE-2024-25153.
Organizations should conduct a comprehensive security review of their web applications and implement layered security measures to defend against similar threats.
Follow Us on: Twitter, Instagram, Facebook to get the latest security news!
Leave A Comment