automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2019-10-23 12:47:24 -05:00
parent 50baaf4d9c
commit 4c3abbae01
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 51 additions and 0 deletions

View File

@ -29938,6 +29938,57 @@
},
"needs_cleanup": false
},
"auxiliary_scanner/http/thinvnc_traversal": {
"name": "ThinVNC Directory Traversal",
"fullname": "auxiliary/scanner/http/thinvnc_traversal",
"aliases": [
],
"rank": 300,
"disclosure_date": "2019-10-16",
"type": "auxiliary",
"author": [
"jinxbox",
"WarMarX",
"bcoles <bcoles@gmail.com>"
],
"description": "This module exploits a directory traversal vulnerability in ThinVNC\n versions 1.0b1 and prior which allows unauthenticated users to retrieve\n arbitrary files, including the ThinVNC configuration file.\n\n This module has been tested successfully on ThinVNC versions 1.0b1\n and \"ThinVNC_Latest\" (2018-12-07).",
"references": [
"CVE-2019-17662",
"URL-https://github.com/bewest/thinvnc/issues/5",
"URL-https://github.com/shashankmangal2/Exploits/blob/master/ThinVNC-RemoteAccess/POC.py",
"URL-https://redteamzone.com/ThinVNC/"
],
"platform": "",
"arch": "",
"rport": 8080,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": null,
"mod_time": "2019-10-17 07:44:19 +0000",
"path": "/modules/auxiliary/scanner/http/thinvnc_traversal.rb",
"is_install_path": true,
"ref_name": "scanner/http/thinvnc_traversal",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
},
"needs_cleanup": false
},
"auxiliary_scanner/http/titan_ftp_admin_pwd": {
"name": "Titan FTP Administrative Password Disclosure",
"fullname": "auxiliary/scanner/http/titan_ftp_admin_pwd",