Lucene search

K
nvdDf4dee71-de3a-4139-9588-11b62fe6c0ffNVD:CVE-2024-25153
HistoryMar 13, 2024 - 3:15 p.m.

CVE-2024-25153

2024-03-1315:15:50
CWE-472
df4dee71-de3a-4139-9588-11b62fe6c0ff
web.nvd.nist.gov
cve-2024-25153
filecatalyst workflow web portal
directory traversal
ftpservlet
upload
documentroot
jsp
code execution
web shell

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%

A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%