Thinfinity VNC v4.0.0.1 - CORS Misconfiguration to RCE
8.3
High
Discovered by
Offensive Team, Fluid Attacks
Summary
Full name
Thinfinity VNC v4.0.0.1 - CORS Misconfiguration to RCE
Code name
State
Public
Release date
May 17, 2022
Affected product
Thinfinity VNC
Affected version(s)
v4.0.0.1
Vulnerability name
CORS Misconfiguration
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS v3.1 base score
8.3
Exploit available
Yes
CVE ID(s)
Description
Thinfinity VNC v4.0.0.1 contains a Cross-Origin Resource Sharing (CORS) vulnerability which can allow an unprivileged remote attacker, if they can trick a user into browse malicious site, to obtain an ID
that can be used to send websocket requests and achieve RCE.
Proof of Concept
Create a malicious site with the following content and send it to the victim.
Create a web socket connection against the target server using the exfiltrated
ID
. The following PoC sends the Ctrl+Esc keystroke combination to the server.The exploit below can be used to send arbitrary commands to the server after the
ID
is exfiltrated. It uses theID
to hijack the VNC connection and send keystrokes or mouse moves to the server.
Exploit
Run the flask application and trick a user with a session in Thinfinity to visit the page.
Mitigation
By 2022-05-17 there is not a patch resolving the issue.
References
Vendor page https://www.cybelesoft.com/thinfinity/
Timeline
Vulnerability discovered
Apr 11, 2022
Vendor contacted
Apr 11, 2022
Public disclosure
May 17, 2022