The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /cgi-bin/login.cgi endpoint. This is due to mishandling of shell meta-characters in the PHPSESSID cookie.
References
Link | Resource |
---|---|
https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 | Product |
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/ | Exploit Third Party Advisory |
https://vulncheck.com/advisories/sangfor-ngaf-sessid-rce | Third Party Advisory |
https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4 | Product |
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/ | Exploit Third Party Advisory |
https://vulncheck.com/advisories/sangfor-ngaf-sessid-rce | Third Party Advisory |
Configurations
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-10 15:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30806
Mitre link : CVE-2023-30806
CVE.ORG link : CVE-2023-30806
JSON object : View
Products Affected
sangfor
- next-gen_application_firewall
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')