ESAFENET CDG 5 - Critical SQL Injection via getOneFileDirectory
CVE-2024-10502 Published on October 30, 2024
ESAFENET CDG FileDirectoryService.java getOneFileDirectory sql injection
A vulnerability has been found in ESAFENET CDG 5 and classified as critical. This vulnerability affects the function getOneFileDirectory of the file /com/esafenet/servlet/fileManagement/FileDirectoryService.java. The manipulation of the argument directoryId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update
Weakness Type
What is a SQL Injection Vulnerability?
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
CVE-2024-10502 has been classified to as a SQL Injection vulnerability or weakness.
Products Associated with CVE-2024-10502
Want to know whenever a new CVE is published for Esafenet Cdg? stack.watch will email you.
Affected Versions
ESAFENET CDG:- Version 5 is affected.
- Version 5 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.