POC详情: 95061def42425123a53e24dcca36b8e13a8e96b6

来源
关联漏洞
标题: TightVNC 安全漏洞 (CVE-2024-42049)
描述:TightVNC是TightVNC开源的一套跨平台的开源远程桌面软件。 TightVNC 2.8.84之前版本存在安全漏洞。攻击者利用该漏洞通过网络连接来连接到控制管道。
描述
PoC for CVE-2024-42049
介绍
# CVE-2024-42049-PoC

## CVE Details
- https://nvd.nist.gov/vuln/detail/CVE-2024-42049
- TightVNC (Server for Windows) before 2.8.84 allows attackers to connect to the control pipe via a network connection.

## PoC Details
- article: https://izvd.eu/research/exploiting-cve-2024-42049
- tested on: 2.7.10, 2.8.81; most likely works on all versions where you have 'TightVNC_Service_Control' or 'TightVNC_Application_Control_On_Session_#' pipes accessible on the network.
- commands:
  - 1 - disconnect all clients - works in both 'server' and 'service' mode
  - 2 - get client list - returns a list of IPs - useful for recon?
  - 3 - shutdown server - works in both 'server' and 'service' mode
  - 4 - get server info - returns soem info about the server, not that useful
  - 5 - get server config  - returns serialized server configuration & passwords _IF SERVER IS NOT PROTECTED WITH CONTROL PASSWORD_

- notes: 
  - note that you need to connect in some way to the machine via SMB first - `net use \\192.168.42.100\` for example, with a valid account, otherwise it will say `[error]: The user name or password is incorrect.`; I will add user & password functionality soon to do this automatically...
  - as this is a named pipe attack it requires SMB to be open so the exploit can interact with TightVNC's control pipes; it will most likely not work if you can only see port 5900 open.
  - the default 'offset' is set to 30 and it works for retrieving the passwords on 2.8.81. you can set it to 21 for 2.7.10. you'll likely need to tweak it a bit for other versions - have fun
文件快照

[4.0K] /data/pocs/95061def42425123a53e24dcca36b8e13a8e96b6 ├── [6.8K] CVE-2024-42049-PoC.c ├── [1.4K] CVE-2024-42049-PoC.sln ├── [6.4K] CVE-2024-42049-PoC.vcxproj ├── [1.3K] CVE-2024-42049-PoC.vcxproj.filters ├── [ 14K] descrypt.c ├── [2.3K] descrypt.h ├── [1.5K] inttypes.h ├── [1.0K] LICENSE.txt └── [1.5K] README.md 0 directories, 9 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。