CVE-2019-17662

CRITICAL NUCLEI

Cybelsoft Thinvnc - Path Traversal

Title source: rule

Description

ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.

Exploits (9)

nomisec WORKING POC 18 stars
by MuirlandOracle · poc
https://github.com/MuirlandOracle/CVE-2019-17662
nomisec WORKING POC 2 stars
by whokilleddb · poc
https://github.com/whokilleddb/CVE-2019-17662
nomisec WORKING POC 2 stars
by bl4ck574r · poc
https://github.com/bl4ck574r/CVE-2019-17662
nomisec WORKING POC 1 stars
by kxisxr · poc
https://github.com/kxisxr/Bash-Script-CVE-2019-17662
nomisec WORKING POC 1 stars
by thomas-osgood · poc
https://github.com/thomas-osgood/CVE-2019-17662
nomisec WORKING POC 1 stars
by rajendrakumaryadav · poc
https://github.com/rajendrakumaryadav/CVE-2019-17662-Exploit
nomisec STUB
by Tamagaft · poc
https://github.com/Tamagaft/CVE-2019-17662
exploitdb WORKING POC VERIFIED
by Nikhith Tumamlapalli · pythonremotewindows
https://www.exploit-db.com/exploits/47519
metasploit WORKING POC
by jinxbox, WarMarX, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/thinvnc_traversal.rb

Nuclei Templates (1)

ThinVNC 1.0b1 - Authentication Bypass
CRITICALVERIFIEDby DhiyaneshDK
Shodan: http.favicon.hash:-1414548363
FOFA: icon_hash=-1414548363

Scores

CVSS v3 9.8
EPSS 0.9410
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-22 CWE-522
Status published

Affected Products (1)

cybelsoft/thinvnc

Timeline

Published Oct 16, 2019
Tracked Since Feb 18, 2026