Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-39cv-xcc4-9q3h

Опубликовано: 22 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The manipulation of the argument keypassword leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The manipulation of the argument keypassword leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 45%
0.00228
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-77
CWE-78

Связанные уязвимости

CVSS3: 8.8
nvd
17 дней назад

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The manipulation of the argument keypassword leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 45%
0.00228
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-77
CWE-78