Cleo.File.Transfer.Software.Unrestricted.File.Upload
Description
This indicates an attack attempt to exploit an Unrestricted File Upload Vulnerability in Cleo File Transfer Software.
This vulnerability is due to improper input validation when uploading files. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability can result in remote code execution.
Affected Products
Cleo Harmony (prior to version 5.8.0.21)
Cleo VLTrader (prior to version 5.8.0.21)
Cleo LexiCom (prior to version 5.8.0.21)
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://support.cleo.com/hc/en-us/articles/27140294267799-Cleo-Product-Security-Advisory-CVE-2024-50623
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |