Fortra has issued an urgent advisory following the discovery of two critical SQL injection vulnerabilities in its FileCatalyst Workflow software, identified as CVE-2024-6632 and CVE-2024-6633. Disclosed on August 27, 2024, these vulnerabilities pose significant risks to the confidentiality, integrity, and availability of affected systems. The issues were uncovered by cybersecurity firms Dynatrace and Tenable, leading to an immediate response from Fortra to address the flaws.
The vulnerabilities impact FileCatalyst Workflow versions up to 5.1.6 Build 139. CVE-2024-6632 allows attackers to perform SQL injection attacks through a field accessible to super administrators. This flaw could enable unauthorized modifications to the database, potentially compromising data integrity and system stability. The vulnerability was detected during a routine security assessment by Dynatrace, which revealed that inadequate validation of user input during setup could be exploited.
CVE-2024-6633 involves a misuse of default credentials for the HSQL database used during the installation process. Although these default credentials are not intended for production environments, systems that have not switched to an alternative database remain vulnerable. This issue could lead to unauthorized access and data breaches, further jeopardizing the security of the affected systems.
In response to these vulnerabilities, Fortra has released an updated version of FileCatalyst Workflow, 5.1.7, which addresses the identified issues. Users are strongly advised to update their systems to this latest version to mitigate potential risks. Fortra has emphasized the importance of adhering to recommended configurations, particularly regarding database setup, to prevent unauthorized access and ensure robust system security.
Reference: