Fortra FileCatalyst Direct Directory Traversal (CVE-2024-25154) (Version Check)

medium Nessus Plugin ID 213326

Synopsis

A web application is affected by a Directory Traversal vulnerability.

Description

The version of Fortra FileCatalyst Direct running on the remote host is prior to 3.8.9. It is, therefore, is affected by a number of vulnerabilities

- Improper URL validation allows path traversal in FileCatalyst Direct 3.8.8 and earlier allowing an encoded payload to cause the web server to return files located outside of the webroot which may lead to data leakage. (CVE-2024-25154)

- FileCatalyst Direct 3.8.8 and earlier, the web server does not properly sanitize illegal characters in a URL which is then embedded in a subsequent error page. A malicious actor could craft a URL which would then execute arbitrary code within an HTML script tag. (CVE-2024-25155)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Fortra FileCatalyst Direct 3.8.9 or later.

See Also

https://www.fortra.com/security/advisory/fi-2024-002

Plugin Details

Severity: Medium

ID: 213326

File Name: fortra_filecatalyst_direct_3_8_9.nasl

Version: 1.1

Type: remote

Family: Misc.

Published: 12/23/2024

Updated: 12/23/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2024-25154

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: x-cpe:/a:fortra:filecatalyst_direct

Required KB Items: installed_sw/Fortra FileCatalyst Direct Server

Patch Publication Date: 3/13/2024

Vulnerability Publication Date: 8/9/2024

Reference Information

CVE: CVE-2024-25154