CVE-2024-25153

A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:*

History

21 Jan 2025, 19:01

Type Values Removed Values Added
CPE cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*
cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:*
First Time Fortra filecatalyst Workflow
Fortra
References () https://filecatalyst.software/public/filecatalyst/Workflow/5.1.6.114/fcweb_releasenotes.html - () https://filecatalyst.software/public/filecatalyst/Workflow/5.1.6.114/fcweb_releasenotes.html - Release Notes
References () https://www.fortra.com/security/advisory/fi-2024-002 - () https://www.fortra.com/security/advisory/fi-2024-002 - Vendor Advisory
CWE CWE-668

Information

Published : 2024-03-13 15:15

Updated : 2025-01-21 19:01


NVD link : CVE-2024-25153

Mitre link : CVE-2024-25153

CVE.ORG link : CVE-2024-25153


JSON object : View

Products Affected

fortra

  • filecatalyst_workflow
CWE
CWE-472

External Control of Assumed-Immutable Web Parameter

CWE-668

Exposure of Resource to Wrong Sphere