Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16516 PoC — ConnectWise Control 信息泄露漏洞

Source
Associated Vulnerability
Title:ConnectWise Control 信息泄露漏洞 (CVE-2019-16516)
Description:ConnectWise Control 19.3.25270.7185版本中存在信息泄露漏洞。攻击者可利用漏洞枚举用户账户。
Description
ConnectWise also known as ScreenConnect  CVE-2019-16516
Readme
# ScreenConnect-UserEnum

ConnectWise also known as ScreenConnect has a userenum vulnerability. 
This is an user enumeration tool for that

##  CVE-2019-16516
vulnerable <= 19.2.24707 ??? didn't really understand if they fixed in upper version https://docs.connectwise.com/ConnectWise_Control_Documentation/ConnectWise_Control_release_notes/Release_notes_archive#ConnectWise_Control_2019.5

~~~
Tried on verions: 6.4.15787.6556-1472470634
                  6.3.13446.6374-2666439717
~~~

## How To
~~~
usage: screenconnect_userenum.py [-h] [-c cnt] [-v] [-s] [-p proxy] url wordlist

http://example.com/Login user enumeration tool

positional arguments:
  url         http://example.com/Login
  wordlist    username wordlist

optional arguments:
  -h, --help  show this help message and exit
  -c cnt      process (thread) count, default 10, too many processes may cause connection problems
  -v          verbose mode
  -s          stop on first user found
  -p proxy    socks4/5 http/https proxy, ex: socks5://127.0.0.1:9050
~~~


example: python3 screenconnect_userenum.py  -p socks5://127.0.0.1:9050 -v http://example.com/Login user.txt
File Snapshot

[4.0K] /data/pocs/5e92f4fd2862df759e4ffca9fe92bc99d8840026 ├── [1.1K] README.md └── [6.9K] screenconnect_userenum.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.