CVE-2024-25153
13.03.2024, 15:15
A directory traversal within the ftpservlet of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended uploadtemp directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portals DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.Enginsight
Vendor | Product | Version |
---|---|---|
fortra | filecatalyst_workflow | 5.0 ≤ 𝑥 < 5.1.6 |
fortra | filecatalyst_workflow | 5.1.6:build112 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-472 - External Control of Assumed-Immutable Web ParameterThe web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields.
- CWE-668 - Exposure of Resource to Wrong SphereThe product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.