In Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of Collection Rest API.
This issue may potentially lead to unintentional information disclosure from the product database.
References
Configurations
History
17 Oct 2024, 14:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dell
Dell secure Connect Gateway |
|
CPE | cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://www.dell.com/support/kbdoc/en-us/000219372/dsa-2023-403-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
14 Feb 2024, 13:59
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-14 09:15
Updated : 2024-10-17 14:40
NVD link : CVE-2023-44294
Mitre link : CVE-2023-44294
CVE.ORG link : CVE-2023-44294
JSON object : View
Products Affected
dell
- secure_connect_gateway
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')