A vulnerability classified as problematic was found in ESAFENET CDG 5. Affected by this vulnerability is the function actionViewDecyptFile of the file /com/esafenet/servlet/client/DecryptApplicationService.java. The manipulation of the argument decryptFileId with the input ../../../Windows/System32/drivers/etc/hosts leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The affected function has a typo and is missing an R. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://flowus.cn/share/0b03c61a-76a5-4f45-9ee7-a88e0f21d539?code=G8A6P3 | Exploit |
https://vuldb.com/?ctiid.281809 | Permissions Required |
https://vuldb.com/?id.281809 | Third Party Advisory |
https://vuldb.com/?submit.426087 | Third Party Advisory |
Configurations
History
30 Oct 2024, 18:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 7.5 |
References | () https://flowus.cn/share/0b03c61a-76a5-4f45-9ee7-a88e0f21d539?code=G8A6P3 - Exploit | |
References | () https://vuldb.com/?ctiid.281809 - Permissions Required | |
References | () https://vuldb.com/?id.281809 - Third Party Advisory | |
References | () https://vuldb.com/?submit.426087 - Third Party Advisory | |
First Time |
Esafenet
Esafenet cdg |
|
CPE | cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:* | |
CWE | CWE-22 |
25 Oct 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-25 12:15
Updated : 2024-10-30 18:54
NVD link : CVE-2024-10379
Mitre link : CVE-2024-10379
CVE.ORG link : CVE-2024-10379
JSON object : View
Products Affected
esafenet
- cdg