In FileCatalyst Direct 3.8.8 and earlier through 3.8.6, the web server does not properly sanitize illegal characters in a URL which is then displayed on a subsequent error page. A malicious actor could craft a URL which would then execute arbitrary code within an HTML script tag.
Solution:
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.fortra.com/security/advisory/fi-2024-003 | vendor advisory |
https://filecatalyst.software/public/filecatalyst/Direct/3.8.9.90/whatsnew_direct.html | release notes |