Home

Description

NetSupport Manager < 14.12.0001 contains an unauthenticated SQL injection vulnerability in its Connectivity Server/Gateway HTTPS request handling. The server evaluates request URIs using an unsanitized SQLite query against the FileLinks table in gateway.db. By injecting SQL through the LinkName/URI value, a remote attacker can control the FileName field used by the server to read and return files from disk, resulting in arbitrary local file disclosure.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-15 | Updated 2025-12-15 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version before 14.12.0001
affected

Credits

Chris Leech finder

References

kb.netsupportsoftware.com/...nd-securing-netsupport-manager/ vendor-advisory patch

www.vulncheck.com/...uthenticated-sqli-local-file-disclosure third-party-advisory

ret2.me/post/2025-12-04-exploiting-netsupport-gateway/ technical-description exploit

cve.org (CVE-2025-34179)

nvd.nist.gov (CVE-2025-34179)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.