提出 #736522: Sangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injection情報

タイトルSangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injection
説明/A critical Remote Command Execution (RCE) vulnerability exists in the Sangfor Operation and Maintenance Security Management System (OSM). The vulnerability is located in the `portValidate` method of the `IpOrPortController` class. The application fails to properly sanitize the `port` parameter in the HTTP POST request. While the `ip` parameter is strictly validated against a regex, the `port` parameter only checks for a specific blacklisted string ("AppScanLocalIpAddress"). This allows an attacker to inject malicious shell commands using separators (such as `;` or `|`), which are then executed by the system shell via `ShellExecutor`.
ソース⚠️ https://github.com/LX-LX88/cve/issues/23
ユーザー
 hhsw34 (UID 91076)
送信2026年01月12日 11:06 (3 月 ago)
モデレーション2026年01月25日 10:50 (13 days later)
ステータス承諾済み
VulDBエントリ342802 [Sangfor Operation and Maintenance Security Management System HTTP POST Request port_validate portValidate 特権昇格]
ポイント20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!