📄 807.txt
字号:
Rule: Sid:807--Summary:This event is generated when an attempt is made to download the wwwboard password file--Impact:Information disclosure.An attacker could crack the encrypted password and gain access to the wwwboardadministrator account--Detailed Information:Releases of WWWBoard (Matt Wright's CGI webboard application) beforeversion 2.0 Alpha 2.1 place the encrypted password for the web application's administrator in a file called "passwd.txt" accessiblefrom the web root.--Affected Systems: --Attack Scenarios:Attacker downloads the passwd.txt file and then launches a passwordcracker to brute force the password (the password is encypted viacrypt(3), and password crackers for this format are ubiquitous). Ifthe password is successfully cracked (due to weak passwords orsignificant cracking resources), the attacker will have administrativeaccess to the wwwboard web application.--Ease of Attack:Simple. Exploit software is not required.--False Positives:None Known--False Negatives:None Known--Corrective Action:Inspect packet to insure that it was an attempt to download thepassword file and not just a webpage discussing WWWBoard.Insure that local installations of WWWBoard are current and properlyconfigured to not save the password file into a publically-accessiblearea.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:CVE: CVE-1999-0953Bugtraq: BID 649Arachnids: 463--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -