exploitdb
WORKING POC
by Freakyclown · pythonwebappshardware
https://www.exploit-db.com/exploits/49262
This exploit leverages a path traversal vulnerability in Cisco ASA and FTD devices to download sensitive files from the target system. It sends crafted HTTP requests to the translation-table endpoint with manipulated parameters to retrieve files.
Classification
Working Poc 95%
Target:
Cisco ASA (9.6 to 9.14.1.10) and FTD (6.2.3 to 6.6.0.1)
No auth needed
Prerequisites:
Network access to the target device · Python 3 with the requests library
exploitdb
WORKING POC
by 3ndG4me · textwebappshardware
https://www.exploit-db.com/exploits/48871
This exploit leverages a path traversal vulnerability in Cisco ASA and FTD devices to download sensitive files from the target system. It uses a crafted URL to bypass directory restrictions and retrieve files from known paths.
Classification
Working Poc 95%
Target:
Cisco ASA and FTD 9.6.4.42
No auth needed
Prerequisites:
Network access to the target device · Target device must be running a vulnerable version of Cisco ASA or FTD
exploitdb
WORKING POC
by 0xmmnbassel · textwebappshardware
https://www.exploit-db.com/exploits/48722
This script exploits CVE-2020-3452, an unauthenticated local file inclusion vulnerability in Cisco ASA and FTD software. It sends crafted HTTP requests to read arbitrary files via path traversal in the URL.
Classification
Working Poc 95%
Target:
Cisco ASA Software >=9.14 (except 9.11), Cisco FTD Software >=6.2.2
No auth needed
Prerequisites:
network access to vulnerable Cisco ASA/FTD device
nomisec
WORKING POC
99 stars
by darklotuskdb · infoleak
https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter
This repository contains a functional exploit script for CVE-2020-3452, which leverages directory traversal in Cisco ASA/FTD web services to read sensitive files. The script automates scanning via Shodan and tests multiple exploit paths to confirm vulnerability.
Classification
Working Poc 95%
Target:
Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) with WebVPN/AnyConnect enabled
No auth needed
Prerequisites:
Shodan CLI installed and configured with an API key · Target systems with WebVPN or AnyConnect enabled
nomisec
WORKING POC
26 stars
by cygenta · infoleak
https://github.com/cygenta/CVE-2020-3452
This script exploits CVE-2020-3452, a path traversal vulnerability in Cisco ASA devices, to download sensitive files from the target system. It sends crafted HTTP requests to the vulnerable endpoint to retrieve files listed in the script.
Classification
Working Poc 95%
Target:
Cisco ASA (Adaptive Security Appliance)
No auth needed
Prerequisites:
Network access to the target Cisco ASA device · Python environment with the 'requests' library installed
nomisec
SCANNER
25 stars
by PR3R00T · infoleak
https://github.com/PR3R00T/CVE-2020-3452-Cisco-Scanner
The repository contains a Python script that scans for CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD software. It sends crafted HTTP requests to detect the vulnerability but does not exploit it further.
Classification
Scanner 95%
Target:
Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software
No auth needed
Prerequisites:
Target URL list in a text file
nomisec
WORKING POC
24 stars
by 3ndG4me · infoleak
https://github.com/3ndG4me/CVE-2020-3452-Exploit
This repository contains a functional exploit script for CVE-2020-3452, which abuses a path traversal vulnerability in Cisco ASA/FTD appliances to enumerate and download files from the web directory. The script uses a predefined list of known files and constructs malicious URLs to fetch them via curl.
Classification
Working Poc 95%
Target:
Cisco ASA/FTD appliances
No auth needed
Prerequisites:
Target IP/hostname · Network access to the target
nomisec
WORKING POC
24 stars
by 0x5ECF4ULT · infoleak
https://github.com/0x5ECF4ULT/CVE-2020-3452
This repository contains a functional Python exploit for CVE-2020-3452, a path traversal vulnerability in Cisco ASA software. The script sends a crafted HTTP request to read arbitrary files from the target system, demonstrating the vulnerability.
Classification
Working Poc 90%
Target:
Cisco ASA Software
No auth needed
Prerequisites:
Network access to the target Cisco ASA device
nomisec
WORKING POC
7 stars
by murataydemir · infoleak
https://github.com/murataydemir/CVE-2020-3452
The repository provides functional HTTP request examples demonstrating directory traversal in Cisco ASA/FTD web services, allowing unauthenticated remote attackers to read sensitive files via crafted URLs. The PoC includes specific request formats and headers for exploitation.
Classification
Working Poc 95%
Target:
Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) with WebVPN or AnyConnect enabled
No auth needed
Prerequisites:
WebVPN or AnyConnect features enabled on the target device
nomisec
WORKING POC
6 stars
by fuzzlove · infoleak
https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal
The repository contains a functional Python script that exploits CVE-2020-3452, a path traversal vulnerability in Cisco ASA/FTD Web Services. The script sends crafted HTTP requests to read sensitive files from the target system by manipulating the 'textdomain' and 'lang' parameters.
Classification
Working Poc 95%
Target:
Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software
No auth needed
Prerequisites:
Target URL · Network access to the vulnerable system
nomisec
SCANNER
4 stars
by grim3 · infoleak
https://github.com/grim3/CVE-2020-3452
The repository contains a Python script that scans for CVE-2020-3452, a directory traversal vulnerability in Cisco ASA and FTD web interfaces. It attempts to download files via crafted URLs but does not include exploit code for execution or further exploitation.
Classification
Scanner 90%
Target:
Cisco Adaptive Security Appliance (ASA), Cisco Firepower Threat Defense (FTD)
No auth needed
Prerequisites:
Network access to the target web interface
nomisec
SCANNER
3 stars
by foulenzer · remote-auth
https://github.com/foulenzer/CVE-2020-3452
The repository contains a Python script that checks for the presence of CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD software, by sending crafted HTTP requests to detect the presence of the vulnerable endpoint. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 95%
Target:
Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software
No auth needed
Prerequisites:
WebVPN or AnyConnect features enabled on the target device
nomisec
SCANNER
2 stars
by faisalfs10x · infoleak
https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner
This repository contains a bash script that scans for Cisco ASA devices vulnerable to CVE-2020-3452 using Shodan. It checks for the presence of a specific path traversal vulnerability by sending a crafted HTTP request and verifying the response.
Classification
Scanner 95%
Target:
Cisco ASA (Adaptive Security Appliance) with WebVPN enabled
No auth needed
Prerequisites:
Shodan CLI installed and configured · Shodan API key · Target ASN (Autonomous System Number)
nomisec
WORKING POC
2 stars
by Loneyers · infoleak
https://github.com/Loneyers/cve-2020-3452
This repository contains a functional exploit for CVE-2020-3452, which is an unauthenticated file read vulnerability in Cisco ASA and Firepower devices. The Go-based tool sends crafted HTTP requests to exploit the path traversal flaw in the web interface, allowing attackers to read sensitive files like configuration data.
Classification
Working Poc 95%
Target:
Cisco ASA and Firepower devices
No auth needed
Prerequisites:
Network access to the vulnerable Cisco device · Web interface exposed to the attacker
nomisec
SCANNER
2 stars
by XDev05 · poc
https://github.com/XDev05/CVE-2020-3452-PoC
This repository provides a script to download and execute an Nmap NSE script for detecting CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD software. It automates the process of scanning multiple hosts listed in a file.
Classification
Scanner 90%
Target:
Cisco ASA and FTD software
No auth needed
Prerequisites:
Nmap installed · list.txt file with target hosts
nomisec
SCANNER
1 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2020-3452
This repository contains a Python-based scanner for detecting CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD software. The tool checks for vulnerable endpoints by sending HTTP OPTIONS requests and analyzing responses for specific strings.
Classification
Scanner 95%
Target:
Cisco ASA and FTD software
No auth needed
Prerequisites:
Network access to the target device · Python 3 environment
nomisec
SCANNER
1 stars
by Aviksaikat · infoleak
https://github.com/Aviksaikat/CVE-2020-3452
The repository contains a Python script that checks if a given Cisco ASA or Firepower device is vulnerable to CVE-2020-3452, an unauthenticated file read vulnerability. It sends a crafted HTTP request to the target and checks the response for indicators of vulnerability.
Classification
Scanner 90%
Target:
Cisco ASA, Cisco Firepower
No auth needed
Prerequisites:
Network access to the target device
nomisec
WORKING POC
1 stars
by paran0id34 · infoleak
https://github.com/paran0id34/CVE-2020-3452
This repository contains a functional Python script that exploits CVE-2020-3452, a directory traversal vulnerability in Cisco ASA and Firepower Threat Defense. The script sends crafted HTTP requests to retrieve sensitive files from vulnerable systems.
Classification
Working Poc 95%
Target:
Cisco ASA, Cisco Firepower Threat Defense
No auth needed
Prerequisites:
Network access to the target system
nomisec
WORKING POC
1 stars
by ludy-dev · infoleak
https://github.com/ludy-dev/Cisco-ASA-LFI
This repository contains a functional Python script that exploits CVE-2020-3452, a Local File Inclusion (LFI) vulnerability in Cisco Adaptive Security Appliance (ASA) Software. The script sends HTTP requests to specific paths to trigger the vulnerability and checks for a successful response.
Classification
Working Poc 95%
Target:
Cisco Adaptive Security Appliance Software 9.11
No auth needed
Prerequisites:
Network access to the target Cisco ASA device
gitlab
WORKING POC
by fuzzlove-group · poc
https://gitlab.com/fuzzlove-group/Cisco-ASA-FTD-Web-Services-Traversal
The repository contains a functional Python script that exploits CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD software. The script sends crafted HTTP requests to read sensitive files from the target system by manipulating the 'textdomain' and 'lang' parameters.
Classification
Working Poc 95%
Target:
Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software
No auth needed
Prerequisites:
Target URL · List of files to attempt to read (provided via 'cisco_asa_file_list.txt')
nomisec
WORKING POC
by abrewer251 · infoleak
https://github.com/abrewer251/CVE-2020-3452_Cisco_ASA_PathTraversal
The repository contains a functional Python script that exploits CVE-2020-3452, a path traversal vulnerability in Cisco ASA/FTD devices, allowing unauthenticated remote file disclosure. The script automates the retrieval of predefined files via crafted HTTP requests and saves them locally.
Classification
Working Poc 100%
Target:
Cisco ASA (9.6–9.14.1.10), Cisco FTD (6.2.3–6.6.0.1)
No auth needed
Prerequisites:
Network access to the target device · Target device must be running a vulnerable version of Cisco ASA/FTD
nomisec
WORKING POC
by iveresk · infoleak
https://github.com/iveresk/cve-2020-3452
This repository contains a functional exploit script for CVE-2020-3452, a path traversal vulnerability in Cisco ASA/FTD devices. The script automates the retrieval of known files from the web directory by abusing the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Cisco ASA/FTD
No auth needed
Prerequisites:
Target IP/hostname · Network access to the vulnerable Cisco ASA/FTD device
nomisec
WORKING POC
by Veids · remote-auth
https://github.com/Veids/CVE-2020-3452_auto
This repository contains a functional exploit for CVE-2020-3452, a path traversal vulnerability in Cisco ASA. The Python script `enum.py` automates the enumeration and download of files from vulnerable Cisco ASA devices by exploiting the flaw in the web services interface.
Classification
Working Poc 95%
Target:
Cisco Adaptive Security Appliance (ASA) Software
No auth needed
Prerequisites:
Network access to the vulnerable Cisco ASA device
nomisec
SCANNER
by Gh0st0ne · poc
https://github.com/Gh0st0ne/http-vuln-cve2020-3452.nse
This repository contains an Nmap NSE script designed to detect CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD devices allowing unauthorized remote file reading. The script scans for the vulnerability but does not include exploit code for active exploitation.
Classification
Scanner 90%
Target:
Cisco ASA and FTD (multiple versions)
No auth needed
Prerequisites:
Network access to the target device · Nmap with NSE support
nomisec
WORKING POC
by mr-r3b00t · poc
https://github.com/mr-r3b00t/CVE-2020-3452
This repository contains functional exploit code for CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD software. The PoC scripts (PowerShell and Bash) demonstrate the vulnerability by attempting to read arbitrary files via crafted HTTP requests.
Classification
Working Poc 90%
Target:
Cisco ASA Software, Cisco FTD Software
No auth needed
Prerequisites:
Network access to the vulnerable Cisco ASA/FTD device
vulncheck_xdb
SCANNER
infoleak
https://github.com/toy0756428/CVE_2020_3452_Detect
This repository contains a Python script that scans for CVE-2020-3452, a path traversal vulnerability in Cisco ASA and FTD software. The script sends a crafted HTTP request to detect the vulnerability but does not exploit it.
Classification
Scanner 90%
Target:
Cisco ASA and FTD software
No auth needed
Prerequisites:
network access to the target device
vulncheck_xdb
SCANNER
infoleak
https://github.com/MrCl0wnLab/checker-cve2020-3452
The repository contains a Python script that checks for the presence of CVE-2020-3452, a directory traversal vulnerability in Cisco ASA and FTD software. The script sends crafted HTTP requests to detect if the target is vulnerable but does not exploit the vulnerability to read files.
Classification
Scanner 95%
Target:
Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software
No auth needed
Prerequisites:
Target must have WebVPN or AnyConnect features enabled