Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Fortra patches critical RCE vulnerability in FileCatalyst transfer tool
    Cyber Security

    Fortra patches critical RCE vulnerability in FileCatalyst transfer tool

    techempireBy techempire2 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 18, 2024Editorial DepartmentVulnerability/Threat Mitigation

    Remote code execution vulnerability

    Fortra has released details of a now-patched critical security vulnerability affecting its FileCatalyst file transfer solution that could allow an unauthenticated attacker to remotely execute code on a vulnerable server .

    This flaw is assigned CVE-2024-25153 and has a CVSS score of 9.8 out of 10.

    “Directory traversal within the FileCatalyst workflow portal ‘ftpservlet’ allows files to be uploaded outside the expected ‘uploadtemp’ directory via a crafted POST request,” the company said in an announcement last week.

    “In the event that the file is successfully uploaded to the portal DocumentRoot, a specially crafted JSP file can be used to execute the code, including the web shell.”

    Internet security

    The company said the vulnerability was first reported on August 9, 2023 and resolved two days later in FileCatalyst Workflow version 5.1.6 Build 114, without a CVE identifier. Fortra was authorized as a CVE Numbering Authority (CNA) in early December 2023.

    Security researcher Tom Wedgbury of LRQA Nettitude is credited with discovering and reporting the flaw. The company has since released a full proof-of-concept (PoC) vulnerability, describing how the flaw can be exploited to upload a web shell and execute arbitrary system commands.

    Fortra also addressed two other security vulnerabilities (CVE-2024-25154 and CVE-2024-25155) in FileCatalyst Direct in January 2024, which could lead to information leakage and code execution.

    Because previously disclosed flaws in Fortra GoAnywhere Managed File Transfer (MFT) were heavily exploited by threat actors such as Cl0p last year, users are advised to apply the necessary updates to mitigate potential threats.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.