| عنوان | Sangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injection |
|---|
| الوصف | /A critical Remote Command Execution (RCE) vulnerability exists in the Sangfor Operation and Maintenance Security Management System (OSM). The vulnerability is located in the `portValidate` method of the `IpOrPortController` class.
The application fails to properly sanitize the `port` parameter in the HTTP POST request. While the `ip` parameter is strictly validated against a regex, the `port` parameter only checks for a specific blacklisted string ("AppScanLocalIpAddress"). This allows an attacker to inject malicious shell commands using separators (such as `;` or `|`), which are then executed by the system shell via `ShellExecutor`. |
|---|
| المصدر | ⚠️ https://github.com/LX-LX88/cve/issues/23 |
|---|
| المستخدم | hhsw34 (UID 91076) |
|---|
| ارسال | 12/01/2026 11:06 AM (3 أشهر منذ) |
|---|
| الاعتدال | 25/01/2026 10:50 AM (13 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 342802 [Sangfor Operation and Maintenance Security Management System HTTP POST Request port_validate portValidate تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|