| 标题 | Sangfor Operation and Maintenance Security Management System (OSM / 运维安全管理系统) v3.0.12 Command Injection |
|---|
| 描述 | A critical Remote Command Execution (RCE) vulnerability exists in the Sangfor Operation and Maintenance Security Management System (OSM). The vulnerability is located in the `getInformation` method of the `FortEquipmentNodeController` class.
The application fails to sanitize the `fortEquipmentIp` parameter in the HTTP request. This parameter is directly concatenated into a bash command string without any validation or escaping. This allows an authenticated (or potentially unauthenticated, depending on filter configuration) attacker to inject malicious shell commands using separators (such as `;`, `|`, or `&`), which are then executed by the system shell with the privileges of the web application user. |
|---|
| 来源 | ⚠️ https://github.com/LX-LX88/cve/issues/24 |
|---|
| 用户 | hhsw34 (UID 91076) |
|---|
| 提交 | 2026-01-12 11時24分 (3 月前) |
|---|
| 管理 | 2026-01-25 10時50分 (13 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 342803 [Sangfor Operation and Maintenance Security Management System HTTP POST Request get_Information getInformation 权限提升] |
|---|
| 积分 | 20 |
|---|