First published: Sun Jun 09 2024(Updated: )
A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/firewall/deletemacbind.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267456. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netentsec NS-ASG Application Security Gateway | ||
Netentsec Application Security Gateway | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5773 is classified as critical due to its SQL injection vulnerability.
To fix CVE-2024-5773, apply the latest security patch provided by Netentsec for the NS-ASG Application Security Gateway.
CVE-2024-5773 is a SQL injection vulnerability found in the file /protocol/firewall/deletemacbind.php.
CVE-2024-5773 affects the Netentsec NS-ASG Application Security Gateway version 6.3.
The exploitation of CVE-2024-5773 could lead to unauthorized access to sensitive data through SQL injection.