The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.
References
Link | Resource |
---|---|
https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 | Product |
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/ | Exploit Third Party Advisory |
https://vulncheck.com/advisories/sangfor-ngaf-username-rce | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-10-10 15:15
Updated : 2023-10-13 14:57
NVD link : CVE-2023-30805
Mitre link : CVE-2023-30805
CVE.ORG link : CVE-2023-30805
JSON object : View
Products Affected
sangfor
- next-gen_application_firewall
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')