First published: Mon Jun 03 2024(Updated: )
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been declared as critical. This vulnerability affects unknown code of the file /protocol/iscuser/uploadiscuser.php of the component JSON Content Handler. The manipulation of the argument messagecontent leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266848. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netentsec NS-ASG Application Security Gateway | ||
Netentsec Application Security Gateway | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5590 has been declared as critical due to its potential impact on the affected systems.
To fix CVE-2024-5590, users should update their Netentsec NS-ASG Application Security Gateway to the latest patched version.
CVE-2024-5590 affects the Netentsec NS-ASG Application Security Gateway version 6.3.
The vulnerability in CVE-2024-5590 affects the JSON Content Handler component found in the file /protocol/iscuser/uploadiscuser.php.
CVE-2024-5590 allows remote attackers to manipulate arguments and potentially execute unauthorized actions on the affected system.