First published: Thu Feb 29 2024(Updated: )
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. Affected is an unknown function of the file /admin/list_localuser.php. The manipulation of the argument ResId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255300. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netentsec NS-ASG Application Security Gateway | ||
Netentsec Application Security Gateway | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2021 has been classified as critical.
CVE-2024-2021 enables SQL injection through the manipulation of the ResId argument in the file /admin/list_localuser.php.
To fix CVE-2024-2021, it is advised to apply the latest security patches provided by Netentsec for the NS-ASG Application Security Gateway.
CVE-2024-2021 affects Netentsec NS-ASG Application Security Gateway version 6.3.
To mitigate the risks associated with CVE-2024-2021, consider implementing web application firewalls and input validation measures.