CVE-2024-25153

A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
Configurations

No configuration.

History

21 Nov 2024, 09:00

Type Values Removed Values Added
Summary
  • (es) Un directory traversal dentro del 'ftpservlet' de FileCatalyst Workflow Web Portal permite cargar archivos fuera del directorio 'uploadtemp' previsto con una solicitud POST especialmente manipulada. En situaciones en las que un archivo se carga correctamente en DocumentRoot del portal web, se pueden utilizar archivos JSP especialmente manipulados para ejecutar código, incluidos los shells web.
References () https://filecatalyst.software/public/filecatalyst/Workflow/5.1.6.114/fcweb_releasenotes.html - () https://filecatalyst.software/public/filecatalyst/Workflow/5.1.6.114/fcweb_releasenotes.html -
References () https://www.fortra.com/security/advisory/fi-2024-002 - () https://www.fortra.com/security/advisory/fi-2024-002 -

13 Mar 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-13 15:15

Updated : 2024-11-21 09:00


NVD link : CVE-2024-25153

Mitre link : CVE-2024-25153

CVE.ORG link : CVE-2024-25153


JSON object : View

Products Affected

No product.

CWE
CWE-472

External Control of Assumed-Immutable Web Parameter