| VID |
21007 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The remote web server appears to be running with Frontpage extensions and lets the file 'users.pwd' to be downloaded by everyone. users.pwd contains the list of users and passwords for the FrontPage web and the file is used on Netscape servers.
The password files on Netscape servers only are:
/_vti_pvt/administrators.pwd for administrators /_vti_pvt/authors.pwd for authors and administrators /_vti_pvt/users.pwd for users, authors, and administrators
This files contains encrypted passwords which could be remotely retrieved by an attacker and cracked offline. If the passwords in this file are weak enough, or enough time is spent cracking them, the attacker could potentially obtain the cleartext password and use it to access resources on the server.
* References: http://www.securityfocus.com/bid/1205 http://xforce.iss.net/xforce/xfdb/3392 |
| Recommendation |
1. If you do not require the functionality provided by FrontPage Server Extensions, remove all the files associated with FrontPage Server Extensions.
2. Make sure passwords chosen for FrontPage accounts are strong enough to subvert cracking attempts if the hashes are obtained by an attacker. Also, the permissions on the _vti_pvt directory and the *.pwd files therein should be modified to disallow remote attackers from retrieving them. This work-around may or may not adversely affect the normal operation of the FrontPage server.
3. Upgrade to the latest version with FrontPage Server extentions. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|