Description

A critical SQL injection vulnerability, CVE-2024-5276, has been identified in Fortra FileCatalyst Workflow, a web-based file exchange and sharing platform used globally for large data transfers. Discovered by Tenable researchers on May 15, 2024, and publicly disclosed on June 25, 2024, the flaw allows remote unauthenticated attackers to create rogue admin users and manipulate application database data. However, data exfiltration is not possible through this vulnerability, as confirmed by Fortra. The vulnerability affects FileCatalyst Workflow version 5.1.6 Build 135 and earlier. Fortra has addressed the issue in FileCatalyst Workflow 5.1.6 Build 139, urging users to upgrade. Exploitation of CVE-2024-5276 requires anonymous access to be enabled on the target instance; otherwise, authentication is necessary. Tenable's research revealed that the flaw stems from the 'findJob' method, which fails to sanitize user-supplied 'jobID' inputs, leading to the formation of a vulnerable SQL query. Using this vector, Tenable's proof-of-concept exploit demonstrates how an attacker can insert a malicious 'jobID' to create a new admin user with known credentials, subsequently gaining unauthorized access. While there are no known active exploitations of this vulnerability, the availability of a working exploit script heightens the risk of imminent attacks. This follows previous incidents, such as the Clop ransomware gang's exploitation of a Fortra GoAnywhere MFT zero-day vulnerability in 2023, underscoring the urgency for affected users to apply the recommended updates promptly.