First published: Thu Mar 28 2024(Updated: )
A vulnerability has been found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. This vulnerability affects unknown code of the file /protocol/log/listloginfo.php. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258430 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netentsec NS-ASG Application Security Gateway | ||
Netentsec Application Security Gateway | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3041 is classified as a critical severity vulnerability.
CVE-2024-3041 affects the /protocol/log/listloginfo.php file, allowing for SQL injection attacks.
Yes, the attack exploiting CVE-2024-3041 can be initiated remotely.
CVE-2024-3041 is an SQL injection vulnerability.
To fix CVE-2024-3041, it is recommended to apply security patches provided by Netentsec for the NS-ASG Application Security Gateway.