Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-20273 PoC — Cisco IOS XE Software 安全漏洞

Source
Associated Vulnerability
Title:Cisco IOS XE Software 安全漏洞 (CVE-2023-20273)
Description:Cisco IOS XE Software是美国思科(Cisco)公司的一个操作系统。用于企业有线和无线访问,汇聚,核心和WAN的单一操作系统,Cisco IOS XE降低了业务和网络的复杂性。 Cisco IOS XE Software存在安全漏洞,该漏洞源于输入验证不足,导致攻击者可以通过web UI功能使用root权限注入命令。
Description
CVE-2023-20273 Exploit PoC
Readme
# CVE-2023-20273
CVE-2023-20273 Exploit PoC

## Usage
```
usage: exploit.py [-h] -t URL -u Username -p Password (-c Command | -r) [-dest Outfile] [-www | -tcp | -null] [-ip LocalIP] [-port LocalPort] [-fs filesystem] [-path filepath] [-operation operation_type] [-v] [-q]

CVE-2023-20273 Exploit PoC

options:
  -h, --help                    show this help message and exit

Target options:
  [Mandatory] Target arguments

  -t URL, --url URL             Target Cisco URL (eg https://192.168.1.1 or http://192.168.2.2:8080)
  -u Username, --user Username  Cisco webui user name
  -p Password, --pass Password  Cisco webui user pass

Exploit mode:
  [Mandatory] Exec command or reverse shell

  -c Command                    Command to run
  -r                            Reverse shell (requires -ip and -port)

Output Options:
  [Optional] Command output options

  -dest Outfile                 [-r | -www | -tcp] destination file (default: random)
  -www                          [Default] Attempt to retrieve output via target web server
  -tcp                          [Not implemented] Attempt to send output to a TCP listener (requires -ip and -port)
  -null                         Do not attempt to get command output

Callback Options:
  For reverse shell or command output

  -ip LocalIP                   Local IP for reverse shell/command output
  -port LocalPort               Local port for reverse shell/command output

Exploit options:
  [Not implemented] Exploit modifiers

  -fs filesystem                Filesystem on target for exploit staging (default: flash)
  -path filepath                Filepath on target filesystem for exploit staging (default: shellsmoke)
  -operation operation_type     Install operation type (not currently implemented) (default: SMU)

Verbosity control:
  -v                            Verbose output
  -q                            Suppress Banner
```
File Snapshot

[4.0K] /data/pocs/368923db41e8a1080ea625b52a3e3ee7160a13bc ├── [ 24K] exploit.py └── [1.9K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.