CVE-2024-25153
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/03/2024
Last modified:
19/09/2025
Description
A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:* | 5.0 (including) | 5.1.6 (excluding) |
| cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://filecatalyst.software/public/filecatalyst/Workflow/5.1.6.114/fcweb_releasenotes.html
- https://www.fortra.com/security/advisory/fi-2024-002
- https://filecatalyst.software/public/filecatalyst/Workflow/5.1.6.114/fcweb_releasenotes.html
- https://www.fortra.com/security/advisory/fi-2024-002
- https://github.com/nettitude/CVE-2024-25153/blob/master/CVE-2024-25153.py



