The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.
References
Link | Resource |
---|---|
https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 | Product |
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/ | Exploit Third Party Advisory |
https://vulncheck.com/advisories/sangfor-ngaf-username-rce | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulnCheck
Published: 2023-10-10T14:25:16.222Z
Updated: 2023-10-10T14:28:15.299Z
Reserved: 2023-04-18T10:31:45.963Z
Link: CVE-2023-30805
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-10T15:15:10.107
Modified: 2023-10-13T14:57:34.343
Link: CVE-2023-30805
JSON object: View
Redhat Information
No data.
CWE