Security News > 2024 > June > PoC exploit for critical Fortra FileCatalyst flaw published (CVE-2024-5276)
A critical SQL injection vulnerability in Fortra FileCatalyst Workflow has been patched; a PoC exploit is already available online.
Fortra FileCatalyst is an enterprise software solution for accellerated, UDP-based file transfer of large files.
"Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required," the company noted.
"SQL Injection results from failure of the application to appropriately validate input. An attacker crafts input strings so that when the target software constructs SQL statements based on the input, the resulting SQL statement performs actions other than those the application intended."
The vulnerability affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier, and has been fixed in 5.1.6 build 139.
Three months ago, PoC exploit code for a critical RCE vulnerability in Fortra FileCatalyst Workflow was also made public, but no exploitation attemps followed.
News URL
https://www.helpnetsecurity.com/2024/06/27/cve-2024-5276-poc/
Related news
- Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869) (source)
- PoC exploit for exploited Ivanti Cloud Services Appliance flaw released (CVE-2024-8190) (source)
- PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987) (source)
- Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409) (source)
- Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342) (source)
- Ivanti fixes critical vulnerabilities in Endpoint Management (CVE-2024-29847) (source)
- Adobe fixes Acrobat Reader zero-day with public PoC exploit (source)
- Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw (source)
- Exploit code released for critical Ivanti RCE flaw, patch now (source)
- Critical VMware vCenter Server bugs fixed (CVE-2024-38812) (source)