PoC Published for Critical RCE Vulnerability in Fortra FileCatalyst


A proof of Concept (PoC) has been published for a critical Remote Code Execution (RCE) vulnerability identified in Fortra’s FileCatalyst software.

This vulnerability, tracked as CVE-2024-25153, poses a severe threat to organizations using the FileCatalyst Workflow Web Portal. It potentially allows attackers to execute arbitrary code on affected systems.

Fortra FileCatalyst
Fortra FileCatalyst

The core of the vulnerability lies in a directory traversal flaw within the ‘ftpservlet’ component of the FileCatalyst Workflow Web Portal.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:


Exploiting this flaw, attackers can bypass intended security mechanisms to upload files outside the designated ‘uploadtemp’ directory through a specially crafted POST request.

Some strings were obfuscated, making the task of reverse engineering the application more challenging.
Some strings were obfuscated, making the task of reverse engineering the application more challenging.

 If an attacker successfully uploads a file to the web portal’s DocumentRoot, they could leverage specially crafted JSP files to execute arbitrary code on the server, including deploying web shells for persistent access and control.

The vulnerability has been assigned a CVSSv3.1 score of 9.8, categorizing it as critical due to its potential impact on confidentiality, integrity, and availability.

Fortran has addressed this vulnerability by releasing an update for FileCatalyst Workflow. Users are urged to upgrade to version 5.1.6 Build 114 or higher to mitigate the risk associated with CVE-2024-25153.Update Notification

Implications and Recommendations

The publication of a PoC for CVE-2024-25153 underscores the importance of timely patch management and vulnerability assessment within organizations.

Given this vulnerability’s critical nature, Fortra FileCatalyst Workflow users must apply the provided updates without delay.

Additionally, organizations should consider conducting a thorough security review of their web applications and implementing layered security measures to defend against similar threats.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.





Source link