CVE-2024-10072

A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5. This issue affects the function actionAddEncryptPolicyGroup of the file /com/esafenet/servlet/policy/EncryptPolicyService.java. The manipulation of the argument checklist leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?id.280721 Permissions Required
https://vuldb.com/?ctiid.280721 Permissions Required
https://vuldb.com/?submit.420914 Third Party Advisory
https://flowus.cn/share/dd690c21-bb5c-4db4-a737-afb2cf54c8e1?code=G8A6P3 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*

History

22 Oct 2024, 14:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Esafenet
Esafenet cdg
CPE cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.280721 - () https://vuldb.com/?ctiid.280721 - Permissions Required
References () https://vuldb.com/?submit.420914 - () https://vuldb.com/?submit.420914 - Third Party Advisory
References () https://vuldb.com/?id.280721 - () https://vuldb.com/?id.280721 - Permissions Required
References () https://flowus.cn/share/dd690c21-bb5c-4db4-a737-afb2cf54c8e1?code=G8A6P3 - () https://flowus.cn/share/dd690c21-bb5c-4db4-a737-afb2cf54c8e1?code=G8A6P3 - Exploit, Third Party Advisory

17 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-17 17:15

Updated : 2024-10-22 14:20


NVD link : CVE-2024-10072

Mitre link : CVE-2024-10072


JSON object : View

Products Affected

esafenet

  • cdg
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')