header-logo
Suggest Exploit
vendor:
MTPutty
by:
Sedat Ozdemir
7.5
CVSS
HIGH
Password Disclosure
200
CWE
Product Name: MTPutty
Affected Version From: 1.0.1.21
Affected Version To: 1.0.1.21
Patch Exists: YES
Related CWE:
CPE: a:ttyplus:mtputty:1.0.1.21
Metasploit:
Other Scripts:
Platforms Tested: Windows 10
2021

MTPutty 1.0.1.21 – SSH Password Disclosure

MTPutty is vulnerable to a password disclosure vulnerability. By running the command “Get-WmiObject Win32_Process | select name, commandline | findstr putty.exe” on powershell, an attacker can view the hidden password.

Mitigation:

Users should update to the latest version of MTPutty and use strong passwords.
Source

Exploit-DB raw data:

# Exploit Title: MTPutty 1.0.1.21 - SSH Password Disclosure
# Exploit Author: Sedat Ozdemir
# Version: 1.0.1.21
# Date: 06/12/2021
# Vendor Homepage: https://ttyplus.com/multi-tabbed-putty/
# Tested on: Windows 10

Proof of Concept
================

Step 1: Open MTPutty and add a new SSH connection.
Step 2: Click double times and connect to the server.
Step 3: Run run “Get-WmiObject Win32_Process | select name, commandline |
findstr putty.exe” on powershell.
Step 4: You can see the hidden password on PowerShell terminal.