Forum Moderators: open

Message Too Old, No Replies

core-project/1.0

core-project/1.0 - Front page vulnerability

         

seanx

5:53 pm on Jan 4, 2007 (gmt 0)

10+ Year Member



There is an older post on here where two people discuss this "spider."
One proposes that it is looking to exploit front page extensions.
The other disagrees. Then the intitial person agrees it's nothing.
But it is.
---------------
2006-12-20 00:19:19 W3SVC25956 C19384-41710 x.x.x.x POST /_vti_bin/_vti_aut/author.dll - 80 - x.x.x.x HTTP/1.1 core-project/1.0 - - x.x.x.x 200 0 0 788 499 890
---------------
2006-12-20 00:19:19 W3SVC25956 C19384-41710 x.x.x.x GET /px0rd.txt - 80 - x.x.x.x HTTP/1.0 core-project/1.0 - - x.x.x.x 200 0 0 364 98 62
---------------

Reference: [packetstormsecurity.org...]

wilderness

12:58 am on Jan 5, 2007 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Welcome to Webmaster World Sean.

5.The login prompt is a good place to perform a brute-force attack (whether it shows up in the Event Log or triggers account lockouts, I have not yet tested). Another related fact is that in order to connect to a WebFolder, FrontPage requires that the author's account have the ability to log on locally. So if you do connect to a WebFolder you will be locally logged on to that server (something to think about);
6.The permissions you have as the web author will normally be greater than those given to IUSR_MACHINE;
7.Passwords are often stored in global.asa and other files which may be used to attack other servers;
8.Most people do not realize that they are vulnerable since a default FrontPage installation does not implement any security restrictions and many people do not understand how to setup FrontPage security.

The "majority" of participants here either have their own servers or are utilizing hosted sites.
Both primarily use Apache.
There's rarely any discussion here of FP.

Items 5 thru 8 would have us believe that all servers are vulnerable and simply NOT SO!

That a visitor to a website could cirumvent log in and passwords just because they have FP installed on the local machine is a bit far-fetched.

Additionally most everybody here has vti_bin lines denied access. Many folks believed initially that vti was a virus as opposed to FP or somebody using Word as a browser.

Don

seanx

10:10 pm on Jan 11, 2007 (gmt 0)

10+ Year Member



it turns out this computer was comprised because of the front page extensions. all someone had to do is add a network place:
[domain.com...] and click it and you could browse the web page file system at your leisure.

your saying to deny access to that vti_bin would remedy this?

seanx

10:11 pm on Jan 11, 2007 (gmt 0)

10+ Year Member



thanks for your response by the way, i forgot i posted this until i searched for px0rd.txt on google again