Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Sangfor EDR 3.2.17R1/3.2.21 - Remote Code Execution

By kannthu

Vidoc logoVidoc Module

What is "Sangfor EDR 3.2.17R1/3.2.21 - Remote Code Execution?"

The "Sangfor EDR 3.2.17R1/3.2.21 - Remote Code Execution" module is designed to detect a critical vulnerability in the Sangfor EDR software versions 3.2.17R1 and 3.2.21. This vulnerability allows remote unauthenticated users to execute arbitrary commands on the target system. The severity of this vulnerability is classified as critical.

This module was authored by pikpikcu.


If successfully exploited, this vulnerability can lead to unauthorized remote code execution on the target system. Attackers can leverage this to gain full control over the affected system, potentially compromising sensitive data, disrupting operations, or launching further attacks.

How the module works?

The module sends an HTTP POST request to the "/api/edr/sangforinter/v2/cssp/slog_client" endpoint with a specific token. It then applies two matching conditions to determine if the vulnerability is present:

    - The module checks the response body for the presence of the regex pattern "root:.*:0:0:". If this pattern is found, it indicates that the vulnerability exists. - The module also verifies that the response status code is 200, indicating a successful request.

If both conditions are met, the module reports the vulnerability.

For more information, you can refer to the following reference:

Module preview

Concurrent Requests (1)
1. HTTP Request template

Content-Type: application/x-www-fo...

Matching conditions
regex: root:.*:0:0:and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability