📄 1166.txt
字号:
Rule: Sid:1166--Summary:This event is generated when an attempt is made to download the file ws_ftp.inivia a web request.--Impact:Serious. Information Disclosure.--Detailed Information:When a user of WS_FTP chooses "save password" when connecting to an FTPserver, the password is stored in the file ws_ftp.ini which may beaccessible via a web server. The stored passwords use a weak encryptionscheme that is easy broken.--Affected Systems: --Attack Scenarios:An attacker might be able to retrieve the file, use one of the widelyavailable password cracking tools and gain valid login information tothe server.--Ease of Attack:Simple.--False Positives:None Known--False Negatives:None Known--Corrective Action:Check the host for signs of compromise.Change all passwords used on the host.Disallow the use of ftp on the server, consider the use of scp totransfer files.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -