Lucene search

K
cvelistFortraCVELIST:CVE-2024-25153
HistoryMar 13, 2024 - 2:10 p.m.

CVE-2024-25153 Remote Code Execution in FileCatalyst Workflow 5.x prior to 5.1.6 Build 114

2024-03-1314:10:36
CWE-472
Fortra
www.cve.org
1
cve-2024-25153
filecatalyst workflow
remote code execution
directory traversal
ftpservlet
documentroot
web shell

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%

A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "Workflow"
    ],
    "product": "FileCatalyst",
    "vendor": "Fortra",
    "versions": [
      {
        "changes": [
          {
            "at": "Build 114",
            "status": "unaffected"
          }
        ],
        "lessThan": "5.1.6",
        "status": "affected",
        "version": "5.1.4",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%

Related for CVELIST:CVE-2024-25153