CVE-2024-5276

9.8 CRITICAL

📋 TL;DR

A SQL injection vulnerability in Fortra FileCatalyst Workflow allows attackers to modify application data, potentially creating administrative users or altering/deleting database content. All versions from 5.1.6 Build 135 and earlier are affected. Unauthenticated exploitation requires anonymous access enabled; otherwise, authenticated user access is needed.

💻 Affected Systems

Products:
  • Fortra FileCatalyst Workflow
Versions: All versions from 5.1.6 Build 135 and earlier
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Anonymous access must be enabled for unauthenticated exploitation; otherwise, authenticated user access is required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative privileges, modifies or deletes critical application data, and potentially disrupts business operations.

🟠

Likely Case

Unauthenticated or authenticated attackers create administrative accounts, modify user permissions, or alter application data.

🟢

If Mitigated

Limited impact if proper input validation, WAF rules, and network segmentation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires SQL injection knowledge but is straightforward given the vulnerability type.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.7 or later

Vendor Advisory: https://www.fortra.com/security/advisory/fi-2024-008

Restart Required: Yes

Instructions:

1. Download the latest version from Fortra support portal. 2. Backup current installation and database. 3. Install the update following vendor instructions. 4. Restart the FileCatalyst Workflow service.

🔧 Temporary Workarounds

Disable Anonymous Access

all

Prevents unauthenticated exploitation by requiring user authentication.

Configure FileCatalyst Workflow to disable anonymous access in administration settings

Implement WAF Rules

all

Blocks SQL injection attempts at the network perimeter.

Add SQL injection detection rules to your web application firewall

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FileCatalyst Workflow from untrusted networks
  • Enable detailed logging and monitoring for SQL injection patterns in application logs

🔍 How to Verify

Check if Vulnerable:

Check FileCatalyst Workflow version in administration interface or configuration files

Check Version:

Check administration dashboard or review installation logs

Verify Fix Applied:

Verify version is 5.1.7 or later and test SQL injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in application logs
  • Unexpected administrative user creation events

Network Indicators:

  • SQL injection patterns in HTTP requests to FileCatalyst endpoints

SIEM Query:

source="filecatalyst.log" AND (sql_injection OR "administrator" AND created)

🔗 References

📤 Share & Export