Fortra Points Patch for Excessive-Danger FileCatalyst Workflow Safety Vulnerability

Aug 28, 2024Ravie LakshmananVulnerability / Knowledge Safety

Fortra Points Patch for Excessive-Danger FileCatalyst Workflow Safety Vulnerability

Fortra has addressed a important safety flaw impacting FileCatalyst Workflow that could possibly be abused by a distant attacker to realize administrative entry.

The vulnerability, tracked as CVE-2024-6633, carries a CVSS rating of 9.8, and stems from the usage of a static password to hook up with a HSQL database.

“The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are printed in a vendor information base article,” Fortra mentioned in an advisory. “Misuse of those credentials might result in a compromise of confidentiality, integrity, or availability of the software program.”

Cybersecurity

“The HSQLDB is barely included to facilitate set up, has been deprecated, and isn’t supposed for manufacturing use per vendor guides. Nevertheless, customers who haven’t configured FileCatalyst Workflow to make use of an alternate database per suggestions are weak to assault from any supply that may attain the HSQLDB.”

Cybersecurity firm Tenable, which has been credited with discovering and reporting the flaw, mentioned the HSQLDB is remotely accessible on TCP port 4406 by default, thereby permitting a distant attacker to hook up with the database utilizing the static password and carry out malicious operations.

FileCatalyst Workflow Security Vulnerability

Following accountable disclosure on July 2, 2024, Fortra has launched a patch to plug the safety gap in FileCatalyst Workflow 5.1.7 or later.

“For instance, the attacker can add an admin-level consumer within the DOCTERA_USERS desk, permitting entry to the Workflow net utility as an admin consumer,” Tenable mentioned.

Additionally addressed in model 5.1.7 is a high-severity SQL injection flaw (CVE-2024-6632, CVSS rating: 7.2) that abuses a kind submission step throughout the setup course of to make unauthorized modifications of the database.

Cybersecurity

“In the course of the setup technique of FileCatalyst Workflow, the consumer is prompted to offer firm data by way of a kind submission,” Dynatrace researcher Robin Wyss mentioned.

“The submitted knowledge is utilized in a database assertion, however the consumer enter will not be going by correct enter validation. Because of this, the attacker can modify the question. This permits for unauthorized modifications on the database.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.


Leave a Reply

Your email address will not be published. Required fields are marked *