Article Details
Scrape Timestamp (UTC): 2024-03-18 13:00:21.459
Source: https://thehackernews.com/2024/03/fortra-patches-critical-rce.html
Original Article Text
Click to Toggle View
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool. Fortra has released details of a now-patched critical security flaw impacting its FileCatalyst file transfer solution that could allow unauthenticated attackers to gain remote code execution on susceptible servers. Tracked as CVE-2024-25153, the shortcoming carries a CVSS score of 9.8 out of a maximum of 10. "A directory traversal within the 'ftpservlet' of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended 'uploadtemp' directory with a specially crafted POST request," the company said in an advisory last week. "In situations where a file is successfully uploaded to web portal's DocumentRoot, specially crafted JSP files could be used to execute code, including web shells." The vulnerability, the company said, was first reported on August 9, 2023, and addressed two days later in FileCatalyst Workflow version 5.1.6 Build 114 without a CVE identifier. Fortra was authorized as a CVE Numbering Authority (CNA) in early December 2023. Security researcher Tom Wedgbury of LRQA Nettitude has been credited with discovering and reporting the flaw. The company has since released a full proof-of-concept (PoC) exploit, describing how the flaw could be weaponized to upload a web shell and execute arbitrary system commands. Also resolved by Fortra in January 2024 are two other security vulnerabilities in FileCatalyst Direct (CVE-2024-25154 and CVE-2024-25155) that could lead to information leakage and code execution. With previously disclosed flaws in Fortra GoAnywhere managed file transfer (MFT) coming under heavy exploitation last year by threat actors like Cl0p, it's recommended that users have applied the necessary updates to mitigate potential threats. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class threat intelligence from Censys Search.
Daily Brief Summary
Fortra has fixed a critical remote code execution (RCE) vulnerability in its FileCatalyst file transfer software, tagged CVE-2024-25153 with a 9.8 CVSS score.
The flaw allowed attackers to upload files outside the 'uploadtemp' directory through a directory traversal issue, potentially executing code via specially crafted JSP files.
Security researcher Tom Wedgbury of LRQA Nettitude identified the vulnerability, which Fortra patched two days after the initial report on August 9, 2023.
A proof-of-concept exploit demonstrated by Fortra shows the vulnerability could be used to upload a web shell for arbitrary system command execution.
Alongside, two other vulnerabilities in FileCatalyst Direct were addressed in January 2024, preventing information leakage and further code execution risks.
Users of Fortra's products are urged to update to the latest versions immediately, especially in light of last year's heavy exploitation of similar flaws in Fortra GoAnywhere by threat actors like Cl0p.