Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Fortra releases patch for high-risk FileCatalyst workflow security vulnerability
Global Security

Fortra releases patch for high-risk FileCatalyst workflow security vulnerability

AdminBy AdminAugust 28, 2024No Comments2 Mins Read
FileCatalyst Workflow Security Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 28, 2024Ravi LakshmananVulnerability / Data Security

FileCatalyst Workflow Security Vulnerability

Fortra has resolved a critical security flaw affecting the FileCatalyst workflow that could be exploited by a remote attacker to gain administrative access.

The vulnerability, tracked as CVE-2024-6633, has a CVSS score of 9.8 and results from the use of a static password to connect to an HSQL database.

“The default credentials to install the HSQL database (HSQLDB) for FileCatalyst Workflow are published to the vendor knowledge base article“Fortra said in the consulting room. “Misuse of these credentials may compromise the confidentiality, integrity, or availability of the software.”

Cyber ​​security

“HSQLDB is included for ease of installation only, is deprecated and not intended for production use per the vendor’s manual. However, users who have not configured FileCatalyst Workflow to use an alternate database as recommended are vulnerable to attacks from any source that can reach HSQLDB.”

Cybersecurity company Tenable, which is credited with discovering and reporting the flaw, said By default, HSQLDB is accessible remotely via TCP port 4406, which allows a remote attacker to connect to the database using a static password and perform malicious operations.

FileCatalyst Workflow Security Vulnerability

Following a responsible disclosure, on July 2, 2024, Fortra released a patch to address the security hole in FileCatalyst Workflow 5.1.7 or later.

“For example, an attacker could add an admin-level user to the DOCTERA_USERS table, allowing access to the Workflow web application as an admin user,” Tenable said.

Also addressed version 5.1.7 contains a serious SQL injection flaw (CVE-2024-6632, CVSS score: 7.2) that abuses the form submission phase of the installation process to make unauthorized changes to the database.

Cyber ​​security

“During the FileCatalyst Workflow setup process, the user is prompted to provide company information via a form submission,” – Robin Wyss, Dynatrace Researcher. said.

“The submitted data is used in a database statement, but the user’s input does not pass proper input validation. As a result, an attacker can modify the request. This allows unauthorized modifications to the database.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.