Description
In FileCatalyst Direct 3.8.8 and earlier through 3.8.6, the web server does not properly sanitize illegal characters in a URL which is then displayed on a subsequent error page. A malicious actor could craft a URL which would then execute arbitrary code within an HTML script tag.
No analysis available yet.
Remediation
Vendor Solution
Upgrade FileCatalyst to version 3.8.9 or later to remediate the XSS vulnerability.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-22493 | In FileCatalyst Direct 3.8.8 and earlier through 3.8.6, the web server does not properly sanitize illegal characters in a URL which is then displayed on a subsequent error page. A malicious actor could craft a URL which would then execute arbitrary code within an HTML script tag. |
References
History
Tue, 21 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortra
Fortra filecatalyst Direct |
|
| CPEs | cpe:2.3:a:fortra:filecatalyst_direct:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortra
Fortra filecatalyst Direct |
Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2024-08-01T23:36:21.639Z
Reserved: 2024-02-06T21:23:57.925Z
Link: CVE-2024-25155
Updated: 2024-08-01T23:36:21.639Z
Status : Analyzed
Published: 2024-03-13T15:15:51.700
Modified: 2025-01-21T18:59:03.507
Link: CVE-2024-25155
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD