New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover

Security Researchers Disclose Critical Exploit Chain in Progress ShareFile

Security researchers at watchTowr Labs have disclosed a critical exploit chain in the Progress ShareFile Storage Zone Controller. The vulnerabilities, tracked as CVE-2026-2699 and CVE-2026-2701, enable unauthenticated attackers to achieve Remote Code Execution (RCE) and completely compromise vulnerable servers.

Risk to Organizations

With roughly 30,000 instances exposed to the public internet, organizations are urged to patch immediately to prevent catastrophic data breaches. Managed file transfer (MFT) solutions remain a top target for advanced persistent threat (APT) groups and ransomware syndicates.

The Target: Storage Zone Controller

While Progress ShareFile operates a popular SaaS platform, many enterprises utilize the on-premises Storage Zone Controller to maintain data sovereignty and regulatory compliance. This software acts as a customer-managed gateway, allowing organizations to keep files on local network shares or private cloud buckets while still utilizing the main ShareFile web interface.

CVE-2026-2699: Bypassing Authentication

The attack sequence begins with an authentication bypass in the administrator configuration panel ( /ConfigService/Admin.aspx ). When an unauthenticated user requests this endpoint, the application issues an HTTP 302 redirect, pointing the user to a secure login page. However, researchers discovered a fatal coding error in the underlying C# codebase.

The developers passed a false boolean flag to the .Redirect() function. This specific flag instructs the server not to terminate the page’s execution after sending the redirect command. Known as an


元記事: https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/