Vulnerabilites related to Fortra - FileCatalyst Workflow
cve-2024-5275
Vulnerability from cvelistv5
Published
2024-06-18 14:11
Modified
2024-08-01 21:11
Severity ?
EPSS score ?
Summary
A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of FileCatalyst Workflow from 5.1.6 Build 130 and earlier.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Fortra | FileCatalyst Direct |
Version: 3.7 < |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fortra:filecatalyst_direct:3.7:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "filecatalyst_direct", "vendor": "fortra", "versions": [ { "lessThan": "3.8.10", "status": "affected", "version": "3.7", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:fortra:filecatalyst_workflow:4.9.8:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "filecatalyst_workflow", "vendor": "fortra", "versions": [ { "lessThan": "5.1.6", "status": "affected", "version": "4.9.8", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5275", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T18:37:44.102902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T19:16:50.495Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.fortra.com/security/advisory/fi-2024-007" }, { "tags": [ "x_transferred" ], "url": "https://support.fortra.com/filecatalyst/kb-articles/action-required-by-june-18th-2024-filecatalyst-transferagent-ssl-and-localhost-changes-MWQwYjI3ZGItZmQyMS1lZjExLTg0MGItMDAyMjQ4MGE0MDNm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "TransferAgent" ], "product": "FileCatalyst Direct", "vendor": "Fortra", "versions": [ { "lessThanOrEqual": "3.8.10.138", "status": "affected", "version": "3.7", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "FileCatalyst Workflow", "vendor": "Fortra", "versions": [ { "lessThanOrEqual": "5.1.6.130", "status": "affected", "version": "4.9.8", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Greg at Palmer Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of\u0026nbsp;FileCatalyst Workflow from 5.1.6 Build 130 and earlier." } ], "value": "A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of\u00a0FileCatalyst Workflow from 5.1.6 Build 130 and earlier." } ], "impacts": [ { "capecId": "CAPEC-191", "descriptions": [ { "lang": "en", "value": "CAPEC-191 Read Sensitive Constants Within an Executable" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "CWE-259 Use of Hard-coded Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T14:11:37.005Z", "orgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "shortName": "Fortra" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.fortra.com/security/advisory/fi-2024-007" }, { "url": "https://support.fortra.com/filecatalyst/kb-articles/action-required-by-june-18th-2024-filecatalyst-transferagent-ssl-and-localhost-changes-MWQwYjI3ZGItZmQyMS1lZjExLTg0MGItMDAyMjQ4MGE0MDNm" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For FileCatalyst Direct users,\u0026nbsp;upgrade to 3.8.10 build 144 (or higher) \u003cbr\u003eFor FileCatalyst Workflow users, upgrade to 5.1.6 build 133 (or later)\u003cbr\u003eFor those using the FileCatalyst TransferAgent remotely, e.g., as a remote-controlled node accepting REST calls, update REST calls to \"http\". If \"https\" is still required, a new SSL key and add it to the agent keystore." } ], "value": "For FileCatalyst Direct users,\u00a0upgrade to 3.8.10 build 144 (or higher) \nFor FileCatalyst Workflow users, upgrade to 5.1.6 build 133 (or later)\nFor those using the FileCatalyst TransferAgent remotely, e.g., as a remote-controlled node accepting REST calls, update REST calls to \"http\". If \"https\" is still required, a new SSL key and add it to the agent keystore." } ], "source": { "discovery": "UNKNOWN" }, "title": "Hard-coded password in FileCatalyst Direct 3.8.10 Build 138 TransferAgent (and earlier) and FileCatalyst Workflow 5.1.6 Build 130 (and earlier)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "assignerShortName": "Fortra", "cveId": "CVE-2024-5275", "datePublished": "2024-06-18T14:11:37.005Z", "dateReserved": "2024-05-23T16:28:44.181Z", "dateUpdated": "2024-08-01T21:11:12.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6632
Vulnerability from cvelistv5
Published
2024-08-27 14:12
Modified
2024-08-29 03:55
Severity ?
EPSS score ?
Summary
A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortra | FileCatalyst Workflow |
Version: 5.0.4 ≤ 5.1.6 Build 139 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "filecatalyst_workflow", "vendor": "fortra", "versions": [ { "lessThanOrEqual": "5.1.6", "status": "affected", "version": "5.0.4", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6632", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T03:55:31.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FileCatalyst Workflow", "vendor": "Fortra", "versions": [ { "lessThanOrEqual": "5.1.6 Build 139", "status": "affected", "version": "5.0.4", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dynatrace Security Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\u003cdiv\u003eA vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability.\u003c/div\u003e\u003c/div\u003e" } ], "value": "A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability." } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T14:12:12.272Z", "orgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "shortName": "Fortra" }, "references": [ { "url": "https://www.fortra.com/security/advisories/product-security/fi-2024-010" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Upgrade to FileCatalyst Workflow 5.1.7 or later." } ], "value": "Upgrade to FileCatalyst Workflow 5.1.7 or later." } ], "source": { "discovery": "UNKNOWN" }, "title": "SQL Injection in FileCatalyst Workflow 5.1.6 Build 139 (and earlier)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "assignerShortName": "Fortra", "cveId": "CVE-2024-6632", "datePublished": "2024-08-27T14:12:12.272Z", "dateReserved": "2024-07-09T20:01:49.676Z", "dateUpdated": "2024-08-29T03:55:31.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6633
Vulnerability from cvelistv5
Published
2024-08-27 14:11
Modified
2024-08-29 03:55
Severity ?
EPSS score ?
Summary
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software.
The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortra | FileCatalyst Workflow |
Version: 5.0.4 ≤ 5.1.6 Build 139 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "filecatalyst_workflow", "vendor": "fortra", "versions": [ { "lessThanOrEqual": "5.1.6.139", "status": "affected", "version": "5.0.4", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6633", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T03:55:32.406Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "FileCatalyst Workflow", "vendor": "Fortra", "versions": [ { "lessThanOrEqual": "5.1.6 Build 139", "status": "affected", "version": "5.0.4", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Tenable Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eThe default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software.\u003cbr\u003e\u003cbr\u003eThe HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.\u003c/div\u003e" } ], "value": "The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software.\n\nThe HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB." } ], "impacts": [ { "capecId": "CAPEC-70", "descriptions": [ { "lang": "en", "value": "CAPEC-70: Try Common or Default Usernames and Passwords" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T14:11:24.527Z", "orgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "shortName": "Fortra" }, "references": [ { "url": "https://www.fortra.com/security/advisories/product-security/fi-2024-011" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Upgrade to FileCatalyst Workflow 5.1.7 or later." } ], "value": "Upgrade to FileCatalyst Workflow 5.1.7 or later." } ], "source": { "discovery": "UNKNOWN" }, "title": "Insecure Default in FileCatalyst Workflow 5.1.6 Build 139 (and earlier)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "assignerShortName": "Fortra", "cveId": "CVE-2024-6633", "datePublished": "2024-08-27T14:11:24.527Z", "dateReserved": "2024-07-09T20:02:00.215Z", "dateUpdated": "2024-08-29T03:55:32.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5276
Vulnerability from cvelistv5
Published
2024-06-25 19:13
Modified
2024-08-01 21:11
Severity ?
EPSS score ?
Summary
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data. Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortra | FileCatalyst Workflow |
Version: 5.1.6; 0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fortra:filecatalyst:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "filecatalyst", "vendor": "fortra", "versions": [ { "status": "affected", "version": "5.1.6; 0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5276", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-27T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-28T03:55:12.770Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0" }, { "tags": [ "x_transferred" ], "url": "https://www.fortra.com/security/advisory/fi-2024-008" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2024-25" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Workflow" ], "product": "FileCatalyst Workflow", "vendor": "Fortra", "versions": [ { "status": "affected", "version": "5.1.6; 0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Tenable Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.\u0026nbsp; Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.\u003c/span\u003e\n\n" } ], "value": "A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.\u00a0 Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required.\u00a0This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier." } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-25T19:13:54.585Z", "orgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "shortName": "Fortra" }, "references": [ { "url": "https://support.fortra.com/filecatalyst/kb-articles/advisory-6-24-2024-filecatalyst-workflow-sql-injection-vulnerability-YmYwYWY4OTYtNTUzMi1lZjExLTg0MGEtNjA0NWJkMDg3MDA0" }, { "url": "https://www.fortra.com/security/advisory/fi-2024-008" }, { "url": "https://www.tenable.com/security/research/tra-2024-25" } ], "source": { "discovery": "EXTERNAL" }, "title": "SQL Injection Vulnerability in FileCatalyst Workflow 5.1.6 Build 135 (and earlier)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "assignerShortName": "Fortra", "cveId": "CVE-2024-5276", "datePublished": "2024-06-25T19:13:54.585Z", "dateReserved": "2024-05-23T16:28:47.722Z", "dateUpdated": "2024-08-01T21:11:12.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }