• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application

You are here: Home / Cyber Security News / Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application

A critical security flaw has been disclosed in Fortra FileCatalyst Workflow that, if remaining unpatched, could make it possible for an attacker to tamper with the application databases.

Tracked as CVE-2024-5276, the vulnerability carries a CVSS rating of 9.8. It impacts FileCatalyst Workflow versions 5.1.6 Establish 135 and before. It has been tackled in model 5.1.6 make 139.

“An SQL injection vulnerability in Fortra FileCatalyst Workflow permits an attacker to modify application facts,” Fortra stated in an advisory published Tuesday. “Very likely impacts involve generation of administrative end users and deletion or modification of information in the application databases.”

It also emphasised that profitable unauthenticated exploitation needs a Workflow system with anonymous obtain enabled. Alternatively, it can also be abused by an authenticated person.

Customers who cannot utilize the patches immediately can disable the vulnerable servlets – csv_servlet, pdf_servlet, xml_servlet, and json_servlet – in the “web.xml” file found in the Apache Tomcat installation listing as temporary workarounds.

Cybersecurity agency Tenable, which documented the flaw on May well 22, 2024, has due to the fact produced a evidence-of-idea (PoC) exploit for the flaw.

“A person-provided jobID is employed to sort the Where clause in an SQL question,” it claimed. “An nameless remote attacker can perform SQLi through the JOBID parameter in numerous URL endpoints of the workflow web software.”

Identified this short article intriguing? Observe us on Twitter  and LinkedIn to go through far more exceptional material we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « New MOVEit Transfer Vulnerability Under Active Exploitation – Patch ASAP!
Next Post: Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide
  • Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads
  • Deepfake Defense in the Age of AI
  • North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

Copyright © 2025 · AllTech.News, All Rights Reserved.