CVE-2024-10613

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in ESAFENET CDG 5 allows remote attackers to execute arbitrary SQL commands by manipulating the 'id' parameter in the delSystemEncryptPolicy function. Organizations using ESAFENET CDG 5 are affected, potentially exposing sensitive database information to unauthorized access.

💻 Affected Systems

Products:
  • ESAFENET CDG 5
Versions: All versions of ESAFENET CDG 5 (specific version range not specified in available information)
Operating Systems: Any OS running ESAFENET CDG 5
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the SystemEncryptPolicyService component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, or full system takeover via SQL injection escalation techniques.

🟠

Likely Case

Unauthorized access to sensitive system data, potential privilege escalation, and database manipulation.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely, making internet-facing instances particularly vulnerable to attack.
🏢 Internal Only: MEDIUM - Internal systems are still at risk from insider threats or compromised internal devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed, making this vulnerability easy to weaponize by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider implementing workarounds or migrating to alternative solutions.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for the delSystemEncryptPolicy function

Modify /com/esafenet/servlet/system/SystemEncryptPolicyService.java to use PreparedStatement with parameter binding

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint

Configure WAF to block requests containing SQL keywords like UNION, SELECT, INSERT, DELETE, DROP, etc. in the 'id' parameter

🧯 If You Can't Patch

  • Isolate the ESAFENET CDG 5 system behind a firewall with strict network access controls
  • Implement database-level protections including least privilege access and query logging

🔍 How to Verify

Check if Vulnerable:

Test the /com/esafenet/servlet/system/SystemEncryptPolicyService endpoint with SQL injection payloads in the 'id' parameter

Check Version:

Check ESAFENET CDG 5 version through administrative interface or configuration files

Verify Fix Applied:

Verify that parameterized queries are implemented and SQL injection attempts are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or parameter manipulation in application logs
  • Unexpected database schema changes

Network Indicators:

  • HTTP requests with SQL keywords in parameters
  • Unusual database connection patterns from application servers

SIEM Query:

source="application_logs" AND ("delSystemEncryptPolicy" OR "SystemEncryptPolicyService") AND ("UNION" OR "SELECT" OR "INSERT" OR sql_injection_patterns)

🔗 References

📤 Share & Export