Exploit implementation for ZyWall USG 20 Authentication Bypass In Configuration Import/Export.
If the tharget is vulnerable it allows to download configuration files which contains sensitive data like password hashes, firewall rules and other network related configurations.
"""
__info__={
'name':'ZyXEL ZyWALL USG',
'description':'Exploit implementation for ZyWall USG 20 Authentication Bypass In Configuration Import/Export.'
'If the tharget is vulnerable it allows to download configuration files which contains sensitive data like password hashes, firewall rules and other network related configurations.',
'authors':[
'RedTeam Pentesting',# vulnerability discovery
],
'references':[
'https://www.exploit-db.com/exploits/17244/',
],
'devices':[
'ZyWALL USG-20',
'ZyWALL USG-20W',
'ZyWALL USG-50',
'ZyWALL USG-100',
'ZyWALL USG-200',
'ZyWALL USG-300',
'ZyWALL USG-1000',
'ZyWALL USG-1050'
'ZyWALL USG-2000'
],
}
target=exploits.Option('','Target address e.g. https://192.168.1.1',validators=validators.url)# target address
port=exploits.Option(443,'Target port')# default port