Home

Description

Sangfor Behavior Management System (also referred to as DC Management System in Chinese-language documentation) contains an XML external entity (XXE) injection vulnerability in the /src/sangforindex endpoint. A remote unauthenticated attacker can submit crafted XML data containing external entity definitions, leading to potential disclosure of internal files, server-side request forgery (SSRF), or other impacts depending on parser behavior. The vulnerability is due to improper configuration of the XML parser, which allows resolution of external entities without restriction. This product is now integrated into their IAM (Internet Access Management) platform and an affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2023-09-06 UTC.

PUBLISHED Reserved 2025-08-25 | Published 2025-08-27 | Updated 2025-08-28 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-611 Improper Restriction of XML External Entity Reference

Product status

Default status
unknown

*
affected

Credits

Anonymouse User via CNBlogs finder

References

www.cnblogs.com/pursue-security/p/17666126.html technical-description exploit

support.sangfor.com.cn/...&version_id=329&category_id=261800 product

www.sangfor.com/...-12-0-23-manage-risky-shadow-it-right-way product

www.vulncheck.com/...nt-system-xml-external-entity-injection third-party-advisory

cve.org (CVE-2023-7307)

nvd.nist.gov (CVE-2023-7307)

Download JSON