HTTP: Netgear ProSAFE NMS300 SQL Injection

This signature detects attempts to exploit a known vulnerability against Netgear ProSAFE NMS300. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

NETGEAR ProSAFE Network Management System getNodesByTopologyMapSearch SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the getNodesByTopologyMapSearch function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19723.

Affected Products

Netgear prosafe_network_management_system

Short Name
HTTP:SQL:INJ:NTGEAR-PAFE-NMS300
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2023-38099 CVE-2023-38100 CVE-2023-44449 Injection NMS300 Netgear ProSAFE SQL
Release Date
09/14/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3781
False Positive
Unknown
Vendors

Netgear

Found a potential security threat?