A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences.
https://129.0.176.5/+CSCOE+/session_password.html
curl -k -H "Cookie: token=../+CSCOU+/csco_logo.gif" https://129.0.176.5/+CSCOE+/session_password.html
{F1113009}
An exploit could allow the attacker to view or delete arbitrary files on the system.