Netentsec NS-ASG Application Security Gateway 6.3 list_resource_icon.php IconId SQL注入

Netentsec NS-ASG Application Security Gateway 6.3 中曾发现分类为致命的漏洞。 受此问题影响的是某些未知功能文件:/admin/list_resource_icon.php?action=delete。 手动调试的软件参数:IconId不合法输入可导致 SQL注入。 使用CWE来声明会导致 CWE-89 的问题。 此漏洞的脆弱性 2024-03-08所公布。 公告共享下载网址是github.com。 该漏洞被处理的名称为CVE-2024-2329, 可以发起远程攻击, 有技术细节可用。 此外还有一个漏洞可利用。 该漏洞利用已公开,可能会被利用。 漏洞利用的当前现价为美元计算大致为USD $0-$5k。 MITRE ATT&CK项目声明攻击技术为T1505。 它被宣布为proof-of-concept。 以下网址提供该漏洞利用:github.com。 估计零日攻击的地下价格约为$0-$5k。 该漏洞被披露后,此前未曾发表过可能的缓解措施。

字段2024-03-08 18時52分2024-04-08 08時51分2024-04-08 08時55分
vendorNetentsecNetentsecNetentsec
nameNS-ASG Application Security GatewayNS-ASG Application Security GatewayNS-ASG Application Security Gateway
version6.36.36.3
file/admin/list_resource_icon.php?action=delete/admin/list_resource_icon.php?action=delete/admin/list_resource_icon.php?action=delete
argumentIconIdIconIdIconId
cwe89 (SQL注入)89 (SQL注入)89 (SQL注入)
risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.mdhttps://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.mdhttps://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.md
availability111
publicity111
urlhttps://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.mdhttps://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.mdhttps://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.md
cveCVE-2024-2329CVE-2024-2329CVE-2024-2329
responsibleVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
date1709852400 (2024-03-08)1709852400 (2024-03-08)1709852400 (2024-03-08)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore6.56.56.5
cvss2_vuldb_tempscore5.65.65.6
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.75.75.7
cvss3_meta_basescore6.36.36.3
cvss3_meta_tempscore5.75.76.0
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1709852400 (2024-03-08)1709852400 (2024-03-08)
cve_nvd_summaryA vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/list_resource_icon.php?action=delete. The manipulation of the argument IconId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256280. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/list_resource_icon.php?action=delete. The manipulation of the argument IconId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256280. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore6.5
cvss3_cna_basescore6.3

Might our Artificial Intelligence support you?

Check our Alexa App!