2024-05-26 14:27:05 +02:00
### [CVE-2019-17662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17662)



### Description
ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
### POC
#### Reference
- http://packetstormsecurity.com/files/154896/ThinVNC-1.0b1-Authentication-Bypass.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/154896/ThinVNC-1.0b1-Authentication-Bypass.html
2024-05-26 14:27:05 +02:00
- https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py
2024-06-09 00:33:16 +00:00
- https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py
2024-05-26 14:27:05 +02:00
- https://redteamzone.com/ThinVNC/
2024-06-09 00:33:16 +00:00
- https://redteamzone.com/ThinVNC/
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/MajortomVR/exploits
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/MuirlandOracle/CVE-2019-17662
- https://github.com/OriGlassman/Workshop-in-Information-Security
- https://github.com/Tamagaft/CVE-2019-17662
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-05-26 14:27:05 +02:00
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
2024-05-26 14:27:05 +02:00
- https://github.com/bl4ck574r/CVE-2019-17662
- https://github.com/dayaramb/dayaramb.github.io
- https://github.com/getdrive/PoC
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/iluaster/getdrive_PoC
- https://github.com/k4is3r13/Bash-Script-CVE-2019-17662
- https://github.com/kxisxr/Bash-Script-CVE-2019-17662
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/rajendrakumaryadav/CVE-2019-17662-Exploit
- https://github.com/rnbochsr/atlas
- https://github.com/thomas-osgood/CVE-2019-17662
- https://github.com/whokilleddb/CVE-2019-17662
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji