First published: Fri Oct 25 2024(Updated: )
A vulnerability classified as critical has been found in ESAFENET CDG 5. Affected is the function actionViewCDGRenewFile of the file /com/esafenet/servlet/client/CDGRenewApplicationService.java. The manipulation of the argument CDGRenewFileId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10378 is classified as a critical vulnerability.
To fix CVE-2024-10378, it is recommended to validate and sanitize inputs for the CDGRenewFileId to prevent SQL injection.
CVE-2024-10378 affects ESAFENET CDG version 5.
Yes, CVE-2024-10378 is identified as an SQL injection vulnerability due to improper handling of the argument CDGRenewFileId.
Yes, due to its nature as a critical SQL injection vulnerability, CVE-2024-10378 can potentially lead to data compromise.