CVE-2019-17662
CRITICAL NUCLEICybelsoft Thinvnc - Path Traversal
Title source: ruleDescription
ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
Exploits (9)
nomisec
WORKING POC
18 stars
by MuirlandOracle · poc
https://github.com/MuirlandOracle/CVE-2019-17662
nomisec
WORKING POC
1 stars
by rajendrakumaryadav · poc
https://github.com/rajendrakumaryadav/CVE-2019-17662-Exploit
exploitdb
WORKING POC
VERIFIED
by Nikhith Tumamlapalli · pythonremotewindows
https://www.exploit-db.com/exploits/47519
metasploit
WORKING POC
by jinxbox, WarMarX, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/thinvnc_traversal.rb
Nuclei Templates (1)
ThinVNC 1.0b1 - Authentication Bypass
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
http.favicon.hash:-1414548363
FOFA:
icon_hash=-1414548363
References (4)
Scores
CVSS v3
9.8
EPSS
0.9410
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-22
CWE-522
Status
published
Affected Products (1)
cybelsoft/thinvnc
Timeline
Published
Oct 16, 2019
Tracked Since
Feb 18, 2026