CVE-2024-8264 – Sensitive information in agent log file when detailed logging is enabled with Robot Schedule Enterprise prior to version 3.05
https://notcve.org/view.php?id=CVE-2024-8264
Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the agent log file when detailed logging is enabled. • https://hstechdocs.helpsystems.com/releasenotes/Content/_ProductPages/Robot/RobotScheduleEnterprise.htm https://www.fortra.com/security/advisories/product-security/fi-2024-012 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2024-6632 – SQL Injection in FileCatalyst Workflow 5.1.6 Build 139 (and earlier)
https://notcve.org/view.php?id=CVE-2024-6632
A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability. • https://www.fortra.com/security/advisories/product-security/fi-2024-010 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-6633 – Insecure Default in FileCatalyst Workflow 5.1.6 Build 139 (and earlier)
https://notcve.org/view.php?id=CVE-2024-6633
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software. The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB. • https://www.fortra.com/security/advisories/product-security/fi-2024-011 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-25157 – Authentication bypass in GoAnywhere MFT prior to 7.6.0
https://notcve.org/view.php?id=CVE-2024-25157
An authentication bypass vulnerability in GoAnywhere MFT prior to 7.6.0 allows Admin Users with access to the Agent Console to circumvent some permission checks when attempting to visit other pages. This could lead to unauthorized information disclosure or modification. • https://www.fortra.com/security/advisories/product-security/fi-2024-009 • CWE-303: Incorrect Implementation of Authentication Algorithm •
CVE-2024-5275 – Hard-coded password in FileCatalyst Direct 3.8.10 Build 138 TransferAgent (and earlier) and FileCatalyst Workflow 5.1.6 Build 130 (and earlier)
https://notcve.org/view.php?id=CVE-2024-5275
A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of FileCatalyst Workflow from 5.1.6 Build 130 and earlier. Se puede encontrar una contraseña codificada en FileCatalyst TransferAgent que se puede usar para desbloquear el almacén de claves desde el cual se pueden leer los contenidos, por ejemplo, la clave privada para los certificados. La explotación de esta vulnerabilidad podría dar lugar a un ataque de máquina intermedia (MiTM) contra los usuarios del agente. • https://support.fortra.com/filecatalyst/kb-articles/action-required-by-june-18th-2024-filecatalyst-transferagent-ssl-and-localhost-changes-MWQwYjI3ZGItZmQyMS1lZjExLTg0MGItMDAyMjQ4MGE0MDNm https://www.fortra.com/security/advisory/fi-2024-007 • CWE-259: Use of Hard-coded Password •