Submit #736513: Sangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injectionainfo

TitelSangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injectiona
BeschreibungA critical Remote Command Execution (RCE) vulnerability exists in the Sangfor Operation and Maintenance Security Management System (OSM). The vulnerability is located in the endpoint /fort/audit/get_clip_img. The application fails to properly sanitize user input in the HTTP POST request parameters when handling clipboard image retrieval. Code analysis reveals that the backend retrieves the frame and dirno parameters and directly concatenates them into a shell command string. This string is subsequently executed by the system shell via ShellExecutor. This interface is accessible without authentication (No Auth).
Quelle⚠️ https://github.com/LX-LX88/cve/issues/22
Benutzer
 hhsw34 (UID 91076)
Einreichung12.01.2026 10:29 (vor 3 Monaten)
Moderieren25.01.2026 10:50 (13 days later)
StatusAkzeptiert
VulDB Eintrag342801 [Sangfor Operation and Maintenance Security Management System HTTP POST Request /fort/audit/get_clip_img erweiterte Rechte]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!