First published: Wed Oct 30 2024(Updated: )
A vulnerability has been found in ESAFENET CDG 5 and classified as critical. This vulnerability affects the function getOneFileDirectory of the file /com/esafenet/servlet/fileManagement/FileDirectoryService.java. The manipulation of the argument directoryId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10502 is classified as critical due to its potential for SQL injection.
To fix CVE-2024-10502, ensure proper input validation and parameterized queries are implemented in the affected function.
ESAFENET CDG version 5 is affected by CVE-2024-10502.
Exploiting CVE-2024-10502 could lead to unauthorized access to database information through SQL injection.
As of now, specific patch information for CVE-2024-10502 should be obtained from ESAFENET's official communications.