ThinManager Path Traversal Download (CVE-2023-27856) Module #20139
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This module exploits a path traversal vulnerability in ThinManager <= v13.0.1 (CVE-2023-27855) to download an arbitrary file from the target system.
The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\SYSTEM.
Limitation: Some files may get mangled by the application during transit. This occurs when the file is transmitted; the original file on the remote system will not get modified.
Verification Steps
msfconsole
use auxiliary/gather/thinmanager_traversal_download
set RHOSTS <IP>
set FILE <file to download>
run
Example output:
Successfully tested on