The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /cgi-bin/login.cgi endpoint. This is due to mishandling of shell meta-characters in the PHPSESSID cookie.
References
Link | Resource |
---|---|
https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 | Product |
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/ | Exploit Third Party Advisory |
https://vulncheck.com/advisories/sangfor-ngaf-sessid-rce | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulnCheck
Published: 2023-10-10T14:27:42.771Z
Updated: 2023-10-10T14:27:42.771Z
Reserved: 2023-04-18T10:31:45.963Z
Link: CVE-2023-30806
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-10T15:15:10.170
Modified: 2023-10-13T15:00:30.383
Link: CVE-2023-30806
JSON object: View
Redhat Information
No data.
CWE