Korean
<< Back
VID 21006
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The remote web server appears to be running with Frontpage extensions and lets the file 'service.pwd' to be downloaded by everyone.
service.pwd contains the list of users and passwords for the FrontPage web and the file isn't used on IIS and WebSite servers. The file contains encrypted passwords which could be remotely retrieved by an attacker and cracked offline. If the passwords in this file are weak enough, or enough time is spent cracking them, the attacker could potentially obtain the cleartext password and use it to access resources on the server.

* See the following site for more information:
http://support.microsoft.com/support/frontpage/Q152306/default.asp

* References:
http://www.securityfocus.com/bid/1205
http://xforce.iss.net/xforce/xfdb/3391
Recommendation 1. If you do not require the functionality provided by FrontPage Server Extensions, remove all the files associated with FrontPage Server Extensions.

2. Make sure passwords chosen for FrontPage accounts are strong enough to subvert cracking attempts if the hashes are obtained by an attacker. Also, the permissions on the _vti_pvt directory and the *.pwd files therein should be modified to disallow remote attackers from retrieving them. This work-around may or may not adversely affect the normal operation of the FrontPage server.

3. Upgrade to the latest version with FrontPage Server extentions.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)