Fortra Releases Security Advisories for FileCatalyst Workflow
Advisories address two vulnerabilities, one rated as critical and the other as high severity
Summary
Advisories address two vulnerabilities, one rated as critical and the other as high severity
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Fortra has released security advisories addressing a critical vulnerability and a high severity vulnerability found in FileCatalyst Workflow. FileCatalyst is an accelerated file transfer software solution that allows the transfer of large files over remote networks.
- CVE-2024-6632 is an SQL injection vulnerability with a CVSSv3 score of 7.2 (high), which if exploited could allow an unauthenticated attacker to modify or delete data in the application database, and create administrative users.
-
CVE-2024-6633 is a insecure default vulnerability with a CVSSv3 score of 9.8 (critical) that could allow an unauthenticated attacker remote access to the database, permitting data manipulation or exfiltration from the database, and admin user creation with access levels contained to the sandbox.
Remediation advice
Affected organisations are encouraged to review Forta Security Advisories FI-2024-010 and FI-2024-011, the additional information in FileCatalyst Workflow Database Vulnerabilities, and update to version 5.1.7 or later.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 28 August 2024 4:36 pm