提出 #736524: Sangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injection情報

タイトルSangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injection
説明A critical Remote Command Execution (RCE) vulnerability exists in the Sangfor Operation and Maintenance Security Management System (OSM). The vulnerability is located in the `getInformation` method of the `FortEquipmentNodeController` class. The application fails to sanitize the `fortEquipmentIp` parameter in the HTTP request. This parameter is directly concatenated into a bash command string without any validation or escaping. This allows an authenticated (or potentially unauthenticated, depending on filter configuration) attacker to inject malicious shell commands using separators (such as `;`, `|`, or `&`), which are then executed by the system shell with the privileges of the web application user.
ソース⚠️ https://github.com/LX-LX88/cve/issues/24
ユーザー
 hhsw34 (UID 91076)
送信2026年01月12日 11:24 (3 月 ago)
モデレーション2026年01月25日 10:50 (13 days later)
ステータス承諾済み
VulDBエントリ342803 [Sangfor Operation and Maintenance Security Management System HTTP POST Request get_Information getInformation 特権昇格]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!