CVE-2024-2330
Netentsec NS-ASG Application Security Gateway index.php sql injection
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- March 08, 2024
- Published Date
- March 09, 2024
- Last Updated
- August 12, 2024
- Vendor
- Netentsec
- Product
- NS-ASG Application Security Gateway
- Description
- A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256281 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Es wurde eine Schwachstelle in Netentsec NS-ASG Application Security Gateway 6.3 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /protocol/index.php. Durch die Manipulation des Arguments IPAddr mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
- Tags
- Score
- 91.57% (Percentile: 99.65%) as of 2025-06-12
- Exploitation
- poc
- Technical Impact
- total
- Exploited in the Wild
- Yes (2025-05-15 00:00:00 UTC) Source
php
nuclei_scanner
CVSS Scores
CVSS v3.1
6.3 - MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS v3.0
6.3 - MEDIUM
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS v2.0
6.5
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
EPSS Score
SSVC Information
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-15 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-2330.yaml | 2025-04-26 00:00:00 UTC |
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel