First published: Tue Mar 19 2024(Updated: )
A vulnerability, which was classified as problematic, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /nac/naccheck.php. The manipulation of the argument username leads to improper neutralization of data within xpath expressions. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257286 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netentsec NS-ASG Application Security Gateway | ||
Netentsec Application Security Gateway | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2648 is classified as a problematic vulnerability affecting Netentsec NS-ASG Application Security Gateway 6.3.
CVE-2024-2648 affects the improper neutralization of data within XPath expressions via manipulated username arguments.
To fix CVE-2024-2648, ensure to update the Netentsec NS-ASG Application Security Gateway to the latest patched version available.
The vulnerable version specifically affected by CVE-2024-2648 is 6.3 of the Netentsec NS-ASG Application Security Gateway.
Implementing strict input validation for username parameters can serve as a temporary workaround for CVE-2024-2648.