ESAFENET CDG 5 NetSecPolicyAjax.java updateNetSecPolicyPriority id/frontId SQL Injection

Gaskiya vulnerability da aka ware a matsayin kura an samu a ESAFENET CDG 5. Hakika, aikin updateNetSecPolicyPriority ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /com/esafenet/servlet/ajax/NetSecPolicyAjax.java, a cikin sashen $software_component. A sa manipulation of the argument id/frontId ka SQL Injection. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-89. Hakika, rauni an bayyana shi 10/18/2024. An raba bayanin tsaro don saukewa a flowus.cn. Wannan matsala ana saninta da CVE-2024-10133. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga flowus.cn. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

2 Goyarwa · 87 Datenpunkte

FurɗeSúgá
10/18/2024 17:58
Gargadi 1/1
10/19/2024 11:27
cvss3_vuldb_tempscore5.75.7
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore5.76.0
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1729202400 (10/18/2024)1729202400 (10/18/2024)
price_0day$0-$5k$0-$5k
software_vendorESAFENETESAFENET
software_nameCDGCDG
software_version55
software_file/com/esafenet/servlet/ajax/NetSecPolicyAjax.java/com/esafenet/servlet/ajax/NetSecPolicyAjax.java
software_functionupdateNetSecPolicyPriorityupdateNetSecPolicyPriority
software_argumentid/frontIdid/frontId
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://flowus.cn/share/a320073e-a545-419e-bfb5-d6e2b8526433?code=G8A6P3https://flowus.cn/share/a320073e-a545-419e-bfb5-d6e2b8526433?code=G8A6P3
exploit_availability11
exploit_publicity11
exploit_urlhttps://flowus.cn/share/a320073e-a545-419e-bfb5-d6e2b8526433?code=G8A6P3https://flowus.cn/share/a320073e-a545-419e-bfb5-d6e2b8526433?code=G8A6P3
source_cveCVE-2024-10133CVE-2024-10133
cna_responsibleVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.65.6
cvss3_vuldb_basescore6.36.3
cve_nvd_summaryA vulnerability has been found in ESAFENET CDG 5 and classified as critical. Affected by this vulnerability is the function updateNetSecPolicyPriority of the file /com/esafenet/servlet/ajax/NetSecPolicyAjax.java. The manipulation of the argument id/frontId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viL
cvss4_cna_vaL
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore6.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore6.5

Do you know our Splunk app?

Download it now for free!