Directory Traversal Vulnerability in FileCatalyst Workflow Web Portal Allows File Upload Outside Intended Directory

CVE-2024-25153
9.8CRITICAL

Key Information

Vendor
Fortra
Status
Filecatalyst
Vendor
CVE Published:
13 March 2024

Badges

👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The vulnerability CVE-2024-25153 affects the FileCatalyst Workflow Web Portal by Fortra, allowing for a directory traversal that permits files to be uploaded outside of the intended directory. This can be exploited to execute code, including web shells, posing a critical risk to organizations using this solution. Security researcher Tom Wedgbury has released a proof-of-concept exploit, increasing the risk of exploitation. The potential impact of this vulnerability includes the exfiltration of sensitive data, establishing a foothold for launching attacks, and disrupting business operations. Organizations are urged to patch the system immediately and enhance monitoring for any signs of intrusion or suspicious file uploads.

Affected Version(s)

FileCatalyst < 5.1.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • First article discovered by LRQA Nettitude

  • 👾

    Exploit exists.

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)8 News Article(s)

Credit

Tom Wedgbury, LRQA Nettitude
.