CVE-2024-2021

A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. Affected is an unknown function of the file /admin/list_localuser.php. The manipulation of the argument ResId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255300. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/dtxharry/cve/blob/main/cve.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.255300 Permissions Required
https://vuldb.com/?id.255300 Third Party Advisory VDB Entry
https://github.com/dtxharry/cve/blob/main/cve.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.255300 Permissions Required
https://vuldb.com/?id.255300 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*

History

21 Jan 2025, 15:01

Type Values Removed Values Added
First Time Netentsec
Netentsec application Security Gateway
CPE cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*
References () https://github.com/dtxharry/cve/blob/main/cve.md - () https://github.com/dtxharry/cve/blob/main/cve.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.255300 - () https://vuldb.com/?ctiid.255300 - Permissions Required
References () https://vuldb.com/?id.255300 - () https://vuldb.com/?id.255300 - Third Party Advisory, VDB Entry

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://github.com/dtxharry/cve/blob/main/cve.md - () https://github.com/dtxharry/cve/blob/main/cve.md -
References () https://vuldb.com/?ctiid.255300 - () https://vuldb.com/?ctiid.255300 -
References () https://vuldb.com/?id.255300 - () https://vuldb.com/?id.255300 -

01 Mar 2024, 14:04

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Netentsec NS-ASG Application Security Gateway 6.3. Ha sido clasificada como crítica. Una función desconocida del archivo /admin/list_localuser.php es afectada por esta vulnerabilidad. La manipulación del argumento ResId conduce a la inyección de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-255300. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

01 Mar 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-01 00:15

Updated : 2025-01-21 15:01


NVD link : CVE-2024-2021

Mitre link : CVE-2024-2021

CVE.ORG link : CVE-2024-2021


JSON object : View

Products Affected

netentsec

  • application_security_gateway
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')