CVE-2024-10611

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in ESAFENET CDG 5 allows remote attackers to execute arbitrary SQL commands via the 'id' parameter in the delProtocol function. Organizations using ESAFENET CDG 5 are affected, potentially exposing database contents and system control. The vulnerability is remotely exploitable and public exploit details exist.

💻 Affected Systems

Products:
  • ESAFENET CDG
Versions: Version 5
Operating Systems: Unknown - likely various
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the PrintScreenListService component; all deployments with this version are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized data access, modification, or deletion of database records, potentially affecting system integrity and confidentiality.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available; remote exploitation without authentication is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Contact ESAFENET for updates and consider workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the delProtocol endpoint.

Network Segmentation

all

Restrict access to the vulnerable service to trusted networks only.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in the application code.
  • Deploy network-level controls to limit access to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if ESAFENET CDG version 5 is installed and accessible; test the delProtocol endpoint with SQL injection payloads.

Check Version:

Check application documentation or contact vendor for version details.

Verify Fix Applied:

Verify that SQL injection attempts are blocked or that the application uses parameterized queries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts or parameter manipulation

Network Indicators:

  • HTTP requests to /com/esafenet/servlet/system/PrintScreenListService.java with SQL payloads

SIEM Query:

source="application_logs" AND ("delProtocol" OR "PrintScreenListService") AND (sql OR injection OR UNION SELECT)

🔗 References

📤 Share & Export