NETGEAR ProSAFE Network Management System getNodesByTopologyMapSearch SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the getNodesByTopologyMapSearch function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19723.
History

Thu, 19 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear prosafe Network Management System
CPEs cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear prosafe Network Management System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-05-03T01:59:01.440Z

Updated: 2024-09-18T18:29:33.088Z

Reserved: 2023-07-12T15:22:20.618Z

Link: CVE-2023-38099

cve-icon Vulnrichment

Updated: 2024-08-02T17:30:14.026Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-03T02:15:52.627

Modified: 2024-11-21T08:12:51.443

Link: CVE-2023-38099

cve-icon Redhat

No data.