Vulnerability in CDG 5 Allows Path Traversal and Remote Code Execution

CVE-2024-10379
7.5HIGH

Key Information

Vendor
Esafenet
Status
Cdg
Vendor
CVE Published:
25 October 2024

Summary

A vulnerability classified as problematic was found in ESAFENET CDG 5. Affected by this vulnerability is the function actionViewDecyptFile of the file /com/esafenet/servlet/client/DecryptApplicationService.java. The manipulation of the argument decryptFileId with the input ../../../Windows/System32/drivers/etc/hosts leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The affected function has a typo and is missing an R. The vendor was contacted early about this disclosure but did not respond in any way.

Affected Version(s)

CDG = 5

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: null to: 4.3 - (MEDIUM)

  • VulDB entry last update

  • Vulnerability Reserved.

  • VulDB entry created

  • Advisory disclosed

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database

Credit

0menc (VulDB User)
.