CVE-2024-10377

A vulnerability was found in ESAFENET CDG 5. It has been rated as critical. This issue affects the function actionPassDecryptApplication1 of the file /com/esafenet/servlet/client/DecryptApplicationService.java. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This is a different issue than CVE-2024-10069. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://flowus.cn/share/1234f712-c774-4a26-a922-809e0a356405?code=G8A6P3 Exploit
https://vuldb.com/?ctiid.281807 Permissions Required VDB Entry
https://vuldb.com/?id.281807 Third Party Advisory VDB Entry
https://vuldb.com/?submit.426085 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-10-25 11:15

Updated : 2024-11-05 19:41


NVD link : CVE-2024-10377

Mitre link : CVE-2024-10377

CVE.ORG link : CVE-2024-10377


JSON object : View

Products Affected

esafenet

  • cdg
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')