CVE-2022-25226

ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.
References
Link Resource
https://fluidattacks.com/advisories/sinatra/ Exploit Third Party Advisory
https://fluidattacks.com/advisories/sinatra/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cybelsoft:thinvnc:1.0:b1:*:*:*:*:*:*

History

21 Nov 2024, 06:51

Type Values Removed Values Added
References () https://fluidattacks.com/advisories/sinatra/ - Exploit, Third Party Advisory () https://fluidattacks.com/advisories/sinatra/ - Exploit, Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-287 NVD-CWE-Other

Information

Published : 2022-04-18 17:15

Updated : 2024-11-21 06:51


NVD link : CVE-2022-25226

Mitre link : CVE-2022-25226

CVE.ORG link : CVE-2022-25226


JSON object : View

Products Affected

cybelsoft

  • thinvnc