A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortra
Fortra filecatalyst Workflow |
|
Weaknesses | CWE-668 | |
CPEs | cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:* cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:* |
|
Vendors & Products |
Fortra
Fortra filecatalyst Workflow |

Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2024-08-01T23:36:21.630Z
Reserved: 2024-02-06T21:23:57.924Z
Link: CVE-2024-25153

Updated: 2024-08-01T23:36:21.630Z

Status : Analyzed
Published: 2024-03-13T15:15:50.913
Modified: 2025-01-21T19:01:46.487
Link: CVE-2024-25153

No data.