CVE-2024-6633
FileCatalyst Workflow HSQLDB Default Credentials Exposure Vulnerability
Description
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software. The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.
INFO
Published Date :
Aug. 27, 2024, 3:15 p.m.
Last Modified :
Aug. 30, 2024, 2:11 p.m.
Source :
df4dee71-de3a-4139-9588-11b62fe6c0ff
Remotely Exploitable :
Yes !
Impact Score :
5.9
Exploitability Score :
3.9
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-6633
.
URL | Resource |
---|---|
https://www.fortra.com/security/advisories/product-security/fi-2024-011 | Vendor Advisory |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-6633
vulnerability anywhere in the article.
- Cybersecurity News
HashiCorp Vault Flaw (CVE-2024-759): Unrestricted SSH Access Threatens System Security
HashiCorp, a leading provider of infrastructure automation software, has issued a critical security advisory concerning a vulnerability in its popular secrets management tool, Vault. The flaw, designa ... Read more
- Cybersecurity News
Critical Flaws Discovered in Jupiter X Core WordPress Plugin Affecting Over 90,000 Sites
Security researchers have uncovered two critical vulnerabilities in the Jupiter X Core WordPress plugin, impacting over 90,000 websites. The flaws could allow unauthenticated attackers to take complet ... Read more
- Cybersecurity News
FlashArray, FlashBlade at Risk: Pure Storage Reveals CVSS 10 Vulnerabilities
Pure Storage has released a critical security advisory detailing multiple high-severity vulnerabilities impacting its FlashArray and FlashBlade storage systems. These vulnerabilities, some with a maxi ... Read more
- Cybersecurity News
Critical Flaw in RAISECOM Gateways Actively Exploited, Exposing Thousands to Remote Attacks
Image: NetsecfishA newly discovered and actively exploited vulnerability in RAISECOM Gateway devices poses a significant threat to enterprise security. The flaw, tracked as CVE-2024-7120 with a critic ... Read more
- Cybersecurity News
CVE-2024-30051: Windows Elevation of Privilege Flaw Exploited by QakBot Malware, PoC Published
Security researchers published the technical details and a proof-of-concept exploit (PoC) code for a zero-day vulnerability in Windows, tracked as CVE-2024-30051, which could allow attackers to escala ... Read more
- TheCyberThrone
Fortra fixes vulnerabilities in FileCatalyst Workflow
Fortra has released patches for two vulnerabilities in FileCatalyst Workflow impacts version 5.1.6 Build 139 and earlier.The first vulnerability tracked as CVE-2024-6633 with a CVSS score of 9.8 is d ... Read more
- BleepingComputer
Fortra fixes critical FileCatalyst Workflow hardcoded password issue
Fortra is warning of a critical hardcoded password flaw in FileCatalyst Workflow that could allow attackers unauthorized access to an internal database to steal data and gain administrator privileges. ... Read more
- The Hacker News
Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability
Vulnerability / Data Security Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access. The vulnerability, ... Read more
- Help Net Security
Critical Fortra FileCatalyst Workflow vulnerability patched (CVE-2024-6633)
Organizations using Fortra’s FileCatalyst Workflow are urged to upgrade their instances, so that attackers can’t access an internal HSQL database by exploiting known static credentials (CVE-2024-6633) ... Read more
- Cybersecurity News
Intel SGX Security Compromised: Root Provisioning Key Extracted
Recently, researcher Mark Ermolov has successfully extracted Intel’s SGX Fuse Key0, also known as the Root Provisioning Key. This key, introduced with Intel’s Skylake processors, is a cornerstone of I ... Read more
- Cybersecurity News
CVE-2024-6633 (CVSS 9.8): Critical Flaw in Fortra FileCatalyst Workflow
Fortra, a prominent provider of enterprise file transfer solutions, has released an urgent security advisory highlighting two critical vulnerabilities within its FileCatalyst Workflow product. Designa ... Read more
- Cybersecurity News
Cyberattack on Magento: Hackers Inject Skimmer, Card Data Stolen
Malicious JavaScript | Image: MalwarebytesDuring a recent cyberattack on numerous online stores utilizing the Magento platform, a skimmer was injected into the sites, stealing customers’ payment card ... Read more
- Cybersecurity News
Urgent Chrome Update: Active Zero-Day Exploit Detected (CVE-2024-7971)
Google has released an urgent Chrome update (version 128.0.6613.84/85) in response to an actively exploited zero-day vulnerability (CVE-2024-7971). This vulnerability, categorized as a type confusion ... Read more
The following table lists the changes that have been made to the
CVE-2024-6633
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Aug. 30, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://www.fortra.com/security/advisories/product-security/fi-2024-011 No Types Assigned https://www.fortra.com/security/advisories/product-security/fi-2024-011 Vendor Advisory Added CWE NIST CWE-798 Added CPE Configuration OR *cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:* versions from (including) 5.0.4 up to (excluding) 5.1.7 -
CVE Received by df4dee71-de3a-4139-9588-11b62fe6c0ff
Aug. 27, 2024
Action Type Old Value New Value Added Description The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software. The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB. Added Reference Fortra https://www.fortra.com/security/advisories/product-security/fi-2024-011 [No types assigned] Added CWE Fortra CWE-200 Added CVSS V3.1 Fortra AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-6633
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-6633
weaknesses.