First published: Tue Mar 19 2024(Updated: )
A vulnerability classified as problematic has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /vpnweb/resetpwd/resetpwd.php. The manipulation of the argument UserId leads to improper neutralization of data within xpath expressions. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257283. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netentsec NS-ASG Application Security Gateway | ||
Netentsec Application Security Gateway | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2645 is classified as a problematic vulnerability affecting the Netentsec NS-ASG Application Security Gateway 6.3.
To fix CVE-2024-2645, it is recommended to update the Netentsec NS-ASG Application Security Gateway to a patched version provided by the vendor.
CVE-2024-2645 affects the reset password functionality located at /vpnweb/resetpwd/resetpwd.php.
CVE-2024-2645 could potentially enable attacks involving improper neutralization of data within XPath expressions.
Organizations using the Netentsec NS-ASG Application Security Gateway version 6.3 are affected by CVE-2024-2645.