A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5. Affected by this issue is some unknown functionality of the file /com/esafenet/servlet/policy/HookWhiteListService.java. The manipulation of the argument policyId leads to sql injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
History

Wed, 30 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Esafenet
Esafenet cdg
CPEs cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*
Vendors & Products Esafenet
Esafenet cdg
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Oct 2024 00:30:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5. Affected by this issue is some unknown functionality of the file /com/esafenet/servlet/policy/HookWhiteListService.java. The manipulation of the argument policyId leads to sql injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Title ESAFENET CDG HookWhiteListService.java sql injection
Weaknesses CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-30T00:00:09.706Z

Updated: 2024-10-30T15:00:14.178Z

Reserved: 2024-10-29T17:29:15.348Z

Link: CVE-2024-10500

cve-icon Vulnrichment

Updated: 2024-10-30T13:43:44.139Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-30T01:15:02.803

Modified: 2024-11-05T21:02:30.333

Link: CVE-2024-10500

cve-icon Redhat

No data.