![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0kbL1o0V6U0mzmaK2ZsUAU3cvExg9WoOHypZ82oYZmFoO-oGcSGGidQgF-_SFxLAGIq3mzUYwCn6inA7vYw-plO6Tg5tMGuA2lSjEBcHb0jj_dvXjDOM5zXoU_JaV8bJmZswB9KWzzFodmqMfNtmtWFIdyALPYeEpDMwr4D3cHrx-NF9k7UxdZt7h6L9x/s1600/forta.png)
Fortra has released details of a now-patched critical security flaw impacting its FileCatalyst file transfer solution that could allow unauthenticated attackers to gain remote code execution on susceptible servers.
Tracked as CVE-2024-25153, the shortcoming carries a CVSS score of 9.8 out of a maximum of 10.
“A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow
Source:: The Hackers News