SQL Injection Vulnerability in FileCatalyst Workflow Allows Modification of Application Data

CVE-2024-5276
9.8CRITICAL

Key Information

Vendor
Fortra
Status
Filecatalyst Workflow
Vendor
CVE Published:
25 June 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.

Affected Version(s)

FileCatalyst Workflow = 5.1.6; 0

News Articles

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • First article discovered by BleepingComputer

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database2 News Article(s)

Credit

Tenable Research
.