SB2025010832 - Multiple vulnerabilities in FUJIFILM Business Innovation Xerox FreeFlow Core
Published: January 8, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Missing Authentication for Critical Function (CVE-ID: CVE-2024-47555)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to missing authentication for critical function. A remote attacker on the local network can gain access to the target application and execute arbitrary code.
2) Path traversal (CVE-ID: CVE-2024-47556)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker on the local network can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.
3) Path traversal (CVE-ID: CVE-2024-47557)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker on the local network can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.
4) Path traversal (CVE-ID: CVE-2024-47558)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator on the local network can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.
5) Path traversal (CVE-ID: CVE-2024-47559)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator on the local network can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.
Remediation
Install update from vendor's website.