Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-3452 PoC — Cisco Adaptive Security Appliances Software 路径遍历漏洞

Source
Associated Vulnerability
Title:Cisco Adaptive Security Appliances Software 路径遍历漏洞 (CVE-2020-3452)
Description:Cisco Adaptive Security Appliances Software(ASA Software)是美国思科(Cisco)公司的一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco Adaptive Security Appliances Software和FTD Software中存在路径遍历漏洞,该漏洞源于受影响设备没有正确验证HTTP请求中的URL。远程攻击者可通过将包含目录遍历字符序列的特制HTTP请求发送到受影响的设备利用该漏洞在目标设备上查
Description
Test vulnerability of CVE-2020-3452
Readme
# CVE-2020-3452 
## Unauthenticated file read in Cisco ASA & Cisco Firepower

> Saikat Karmakar | Nov : 2021

--- 

- This will test if the given host is vulnerable to CVE 2020-3452 or not
Requirements:
```
requests
termcolor
```


Usage:
```py
dark_lord@kali: python3 cve-2020-3452.py -h

usage: cve-2020-3452.py [-h] [-u U] [-f F]

CVE-2020-3452 Vulnerability Test

optional arguments:
  -h, --help  show this help message and exit
  -u U        url to exploit
  -f F        pass the file containing urls
```

![](usage.png)

P.S. This script is for educational purpose only

#### TODO:
- [ ] Threading for large amount of hosts 
- [ ] Test if it works on every vulnerable url
File Snapshot

[4.0K] /data/pocs/66c9069999edea95b80cb8de168a4f195579e62f ├── [1.7K] cve-2020-3452.py ├── [ 679] README.md ├── [2.2K] requirements.py ├── [ 18] requirements.txt └── [ 63K] usage.png 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.