{"id":13393,"date":"2026-04-03T20:44:36","date_gmt":"2026-04-03T20:44:36","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13393"},"modified":"2026-04-03T20:44:36","modified_gmt":"2026-04-03T20:44:36","slug":"new-progress-sharefile-flaws-expose-servers-to-unauthorized-distant-takeover","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13393","title":{"rendered":"New Progress ShareFile Flaws Expose Servers to Unauthorized Distant Takeover"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Safety researchers at watchTowr Labs have disclosed a crucial exploit chain within the Progress ShareFile Storage Zone Controller. <\/p>\n<p>The vulnerabilities, tracked as CVE-2026-2699 and CVE-2026-2701, allow unauthenticated attackers to attain Distant Code Execution (RCE) and fully compromise weak servers. <\/p>\n<p>With roughly 30,000 situations uncovered to the general public web, organizations are urged to patch instantly to forestall catastrophic information breaches.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/ransomware-attacks-on-organizations-surge-213\/\" target=\"_blank\" rel=\"noreferrer noopener\">Managed file switch (MFT)<\/a> options stay a prime goal for superior persistent menace (APT) teams and ransomware syndicates. <\/p>\n<p>Following historic breaches involving instruments like MOVEit, Cleo Concord, and GoAnywhere, menace actors repeatedly hunt for unpatched data-sharing gateways. <\/p>\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"625\" height=\"132\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-25.png\" alt=\"uploaded file with no extension and randomized name(Source: WatchTowr)\" class=\"wp-image-182492\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-25.png 625w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-25-300x63.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-25-150x32.png 150w\" sizes=\"(max-width: 625px) 100vw, 625px\"\/><figcaption class=\"wp-element-caption\">uploaded file with no extension and randomized identify(Supply: WatchTowr)<\/figcaption><\/figure>\n<p>These newly uncovered ShareFile flaws current a extremely profitable alternative for attackers trying to infiltrate company networks and siphon delicate mental property.<\/p>\n<h2 class=\"wp-block-heading\" id=\"the-target-storage-zone-controller\"><strong>The Goal: Storage Zone Controller<\/strong><\/h2>\n<p>Whereas Progress ShareFile operates a well-liked SaaS platform, many enterprises make the most of the on-premises Storage Zone Controller to take care of information sovereignty and regulatory compliance. <\/p>\n<p>This software program acts as a customer-managed gateway, permitting organizations to maintain information on native community shares or non-public cloud buckets whereas nonetheless using the primary ShareFile internet interface. <\/p>\n<p>The newly found vulnerabilities reside solely inside this self-hosted utility.<\/p>\n<p id=\"cve-2026-2699-bypassing-authentication\"><strong>CVE-2026-2699: Bypassing Authentication<\/strong><\/p>\n<p>The assault sequence begins with an<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/cisco-secure-firewall-vulnerability-2\/\" target=\"_blank\" rel=\"noreferrer noopener\"> authentication bypass <\/a>within the administrator configuration panel (<code>\/ConfigService\/Admin.aspx<\/code>). <\/p>\n<p>When an unauthenticated person requests this endpoint, the applying points an HTTP 302 redirect, pointing the person to a safe login web page.<\/p>\n<p>Nonetheless, researchers found a deadly coding error within the underlying C# codebase. The builders handed a\u00a0<code>false<\/code>\u00a0boolean flag to the\u00a0<code>.Redirect()<\/code>\u00a0operate. <\/p>\n<p>This particular flag instructs the server\u00a0<em>not<\/em>\u00a0to terminate the web page\u2019s execution after sending the redirect command. <\/p>\n<p>Generally known as an \u201c<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/renengine-loader\/\" target=\"_blank\" rel=\"noreferrer noopener\">Execution After Redirect<\/a>\u201d (EAR) vulnerability, this enables an attacker to easily intercept the HTTP response, drop the\u00a0<code>Location<\/code>\u00a0header, and cargo the absolutely useful admin panel, no credentials required.<\/p>\n<p id=\"cve-2026-2701-achieving-remote-code-execution\"><strong>CVE-2026-2701: Reaching Distant Code Execution<\/strong><\/p>\n<p>With administrative entry secured, the attacker can exploit the second vulnerability to execute malicious code. <\/p>\n<p>The Storage Zone Controller permits directors to configure a \u201c<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/microsoft-teams-to-begin-sharing-employee-location\/\" target=\"_blank\" rel=\"noreferrer noopener\">Community Share Location<\/a>\u201d for person uploads. <\/p>\n<p>Whereas the applying assessments the offered path to make sure it has learn and write permissions, it fully fails to validate whether or not the trail is a authentic, protected storage listing.<\/p>\n<p>Attackers can exploit this oversight by reconfiguring the storage vacation spot to level straight into the applying\u2019s public webroot (<code>C:inetpubwwwrootShareFileStorageCenterdocumentum<\/code>). <\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"760\" height=\"262\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-24.png\" alt=\"webshell (and its upload path) in action(Source: WatchTowr)\" class=\"wp-image-182488\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-24.png 760w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-24-300x103.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-24-150x52.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/04\/image-24-696x240.png 696w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\"\/><figcaption class=\"wp-element-caption\">webshell (and its add path) in motion(Supply: WatchTowr)<\/figcaption><\/figure>\n<p>As soon as the trail is modified, the attacker can add a malicious ASPX internet shell disguised as an ordinary file. <\/p>\n<p>By navigating to that uploaded script of their browser, the attacker features full, unauthorized distant management over the server.<\/p>\n<p>These vulnerabilities particularly affect Department 5.x of the ShareFile Storage Zone Controller, which is constructed on ASP.NET. <\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/labs.watchtowr.com\/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The failings had been confirmed by WatchTowr Labs <\/a>in model 5.12.3. Progress addressed each vulnerabilities in model 5.12.4, which was quietly rolled out to clients on March 10, 2026.<\/p>\n<p>Safety groups should instantly improve their Storage Zone Controllers to model 5.12.4 or later. <\/p>\n<p>Moreover, defenders ought to monitor internet server logs for anomalous requests to configuration endpoints, examine the webroot for sudden ASPX information, and make sure that on-premises file gateways are shielded behind sturdy firewalls wherever potential.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Comply with us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Prompt Updates and Set GBH as a Most popular Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google<\/a>.<\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Safety researchers at watchTowr Labs have disclosed a crucial exploit chain within the Progress ShareFile Storage Zone Controller. The vulnerabilities, tracked as CVE-2026-2699 and CVE-2026-2701, allow unauthenticated attackers to attain Distant Code Execution (RCE) and fully compromise weak servers. With roughly 30,000 situations uncovered to the general public web, organizations are urged to patch instantly [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13395,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[4300,1812,2592,1151,2542,8503,1814,8428],"class_list":["post-13393","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-expose","tag-flaws","tag-progress","tag-remote","tag-servers","tag-sharefile","tag-takeover","tag-unauthorized"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13393"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13393\/revisions"}],"predecessor-version":[{"id":13394,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13393\/revisions\/13394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13395"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-04 00:34:01 UTC -->