First published: Thu Oct 17 2024(Updated: )
A vulnerability was found in ESAFENET CDG 5. It has been rated as critical. Affected by this issue is the function actionPassMainApplication of the file /com/esafenet/servlet/client/MailDecryptApplicationService.java. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10069 has been rated as critical due to the potential for SQL injection.
To fix CVE-2024-10069, patch the vulnerable function actionPassMainApplication in the MailDecryptApplicationService.java file.
CVE-2024-10069 allows attackers to perform unauthorized SQL queries that can compromise the database.
CVE-2024-10069 affects ESAFENET CDG version 5.
You can identify if your system is vulnerable to CVE-2024-10069 by checking if ESAFENET CDG version 5 is deployed and if the actionPassMainApplication function is exposed.