Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.FORTRA_FILECATALYST_WORKFLOW_CVE-2024-25153.NBIN
HistoryMay 15, 2024 - 12:00 a.m.

Fortra FileCatalyst Workflow Path Traversal (CVE-2024-25153)

2024-05-1500:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
2
fortra filecatalyst
workflow
path traversal
cve-2024-25153
binary data
scanner

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.8%

The Fortra FileCatalyst Workflow running on the remote host is affected by a path traversal vulnerability. An unauthenticated, remote attacker can, via specifically crafted messages, to upload and execute malicious JSP files.

Binary data fortra_filecatalyst_workflow_cve-2024-25153.nbin
VendorProductVersionCPE
fortrafilecatalyst_workflowx-cpe:/a:fortra:filecatalyst_workflow

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.8%

Related for FORTRA_FILECATALYST_WORKFLOW_CVE-2024-25153.NBIN