Directory Traversal in FileCatalyst Workflow

Fortra Security and Trust Center

FI-2024-002 - Directory Traversal in FileCatalyst Workflow

Severity
Critical
Published Date
13-Mar-2024
Updated Date
13-Mar-2024
Vulnerabilities
CVE-2024-25153
 
Notes
Description

A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.

FAQ

Question: Why is a CVE being issued now for a vulnerability that was reported in August, 2023.

Answer: This vulnerability was reported prior to Fortra joining the CNA program and fixed in August, 2023. We are issuing a CVE now at the request of the individual who initially reported the vulnerability.

 

Vulnerabilities

 
Directory Traversal in FileCatalyst Workflow
Severity
Critical
CVE
CVE-2024-25153
CWE
CWE-472:External Control of Assumed-Immutable Web Parameter
Discovery Date
09-Aug-2023
CSSv3.1
9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Products
Fortra FileCatalyst Workflow 5.x before 5.1.6 Build 114
Vulnerability Notes
Remediation: Vendor Fix

Upgrade to FileCatalyst 5.1.6 Build 114 or higher.

 
References
 

Acknowledgements

Fortra would like to thank the following individuals:

  • Tom Wedgbury , LRQA Nettitude