{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2645","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-03-19T13:48:18.779Z","datePublished":"2024-03-19T22:31:04.320Z","dateUpdated":"2024-08-01T19:18:47.917Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-03-19T22:31:04.320Z"},"title":"Netentsec NS-ASG Application Security Gateway resetpwd.php xpath injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-643","lang":"en","description":"CWE-643 Improper Neutralization of Data within XPath Expressions"}]}],"affected":[{"vendor":"Netentsec","product":"NS-ASG Application Security Gateway","versions":[{"version":"6.3","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /vpnweb/resetpwd/resetpwd.php. The manipulation of the argument UserId leads to improper neutralization of data within xpath expressions. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257283. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in Netentsec NS-ASG Application Security Gateway 6.3 entdeckt. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /vpnweb/resetpwd/resetpwd.php. Durch Manipulation des Arguments UserId mit unbekannten Daten kann eine improper neutralization of data within xpath expressions-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-03-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-03-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-03-19T14:53:23.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"dtxharry (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.257283","name":"VDB-257283 | Netentsec NS-ASG Application Security Gateway resetpwd.php xpath injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.257283","name":"VDB-257283 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-27T19:15:38.933363Z","id":"CVE-2024-2645","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-27T19:15:45.652Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:18:47.917Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.257283","name":"VDB-257283 | Netentsec NS-ASG Application Security Gateway resetpwd.php xpath injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.257283","name":"VDB-257283 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md","tags":["exploit","x_transferred"]}]}]}}