A vulnerability classified as problematic was found in ESAFENET CDG 5. Affected by this vulnerability is the function actionViewDecyptFile of the file /com/esafenet/servlet/client/DecryptApplicationService.java. The manipulation of the argument decryptFileId with the input ../../../Windows/System32/drivers/etc/hosts leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The affected function has a typo and is missing an R. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://flowus.cn/share/0b03c61a-76a5-4f45-9ee7-a88e0f21d539?code=G8A6P3 | Exploit |
https://vuldb.com/?ctiid.281809 | Permissions Required |
https://vuldb.com/?id.281809 | Third Party Advisory |
https://vuldb.com/?submit.426087 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-10-25 12:15
Updated : 2024-10-30 18:54
NVD link : CVE-2024-10379
Mitre link : CVE-2024-10379
CVE.ORG link : CVE-2024-10379
JSON object : View
Products Affected
esafenet
- cdg