Today > | 1 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-5276

June 25, 2024, 8:15 p.m.

CVSS Score

9.8 / 10

Product(s) Impacted

FileCatalyst Workflow

  • 5.1.6 Build 135 and earlier

Description

A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.

Weaknesses

CWE-20
Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE ID: 20

Date

Published: June 25, 2024, 8:15 p.m.

Last Modified: June 25, 2024, 8:15 p.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

df4dee71-de3a-4139-9588-11b62fe6c0ff

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score
9.8
Exploitability Score
3.9
Impact Score
5.9
Base Severity
CRITICAL
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

https://support.fortra.com/ df4dee71-de3a-4139-9588-11b62fe6c0ff

https://www.fortra.com/ df4dee71-de3a-4139-9588-11b62fe6c0ff

https://www.tenable.com/ df4dee71-de3a-4139-9588-11b62fe6c0ff