CVE-2022-25226

ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.
References
Link Resource
https://fluidattacks.com/advisories/sinatra/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cybelsoft:thinvnc:1.0:b1:*:*:*:*:*:*

History

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-287 NVD-CWE-Other

25 Apr 2022, 16:17

Type Values Removed Values Added
CPE cpe:2.3:a:cybelsoft:thinvnc:1.0:b1:*:*:*:*:*:*
CWE CWE-287
References (MISC) https://fluidattacks.com/advisories/sinatra/ - (MISC) https://fluidattacks.com/advisories/sinatra/ - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 10.0

18 Apr 2022, 17:45

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-18 17:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-25226

Mitre link : CVE-2022-25226

CVE.ORG link : CVE-2022-25226


JSON object : View

Products Affected

cybelsoft

  • thinvnc