Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool

Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool

March 18, 2024 at 10:09AM

Fortra disclosed a critical security flaw in its FileCatalyst solution allowing unauthenticated attackers to achieve remote code execution by bypassing restrictions on file uploads. Tracked as CVE-2024-25153, the flaw received a CVSS score of 9.8 and was patched in FileCatalyst Workflow version 5.1.6 Build 114. Other vulnerabilities, CVE-2024-25154 and CVE-2024-25155, were also addressed.

Summary of Meeting Notes:

– Fortra has disclosed a critical security flaw in its FileCatalyst file transfer solution, tracked as CVE-2024-25153, with a CVSS score of 9.8.
– The vulnerability allows unauthenticated attackers to gain remote code execution on susceptible servers through a directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal.
– This vulnerability was first reported on August 9, 2023, and addressed in FileCatalyst Workflow version 5.1.6 Build 114. Fortra became a CVE Numbering Authority (CNA) in December 2023.
– Security researcher Tom Wedgbury of LRQA Nettitude discovered and reported the flaw, with a proof-of-concept (PoC) exploit released.
– Additionally, Fortra resolved two other security vulnerabilities in FileCatalyst Direct (CVE-2024-25154 and CVE-2024-25155) in January 2024.
– Users are advised to apply necessary updates to mitigate potential threats, especially in light of past exploitation of vulnerabilities in Fortra GoAnywhere managed file transfer (MFT) by threat actors like Cl0p.

Is there anything else I can assist you with?

Full Article