Lucene search

K
cveDf4dee71-de3a-4139-9588-11b62fe6c0ffCVE-2024-25153
HistoryMar 13, 2024 - 3:15 p.m.

CVE-2024-25153

2024-03-1315:15:50
CWE-472
df4dee71-de3a-4139-9588-11b62fe6c0ff
web.nvd.nist.gov
12
filecatalyst
directory traversal
unauthorized upload
code execution
cve-2024-25153
security vulnerability
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%

A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "Workflow"
    ],
    "product": "FileCatalyst",
    "vendor": "Fortra",
    "versions": [
      {
        "changes": [
          {
            "at": "Build 114",
            "status": "unaffected"
          }
        ],
        "lessThan": "5.1.6",
        "status": "affected",
        "version": "5.1.4",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%