CGI_WWWBOARD_PASSWD_EXPLOIT
DESCRIPTION
A vulnerability in the default installation of the WWWBoard package allows remote attackers to steal the encrypted password of the WWWBoard admin. This allows the remote attackers to mount an off-line dictionary and brute force attack against the password. The WWWBoard package is a popular web based discussion board by Matt Wright. The administration area of the WWWBoard package requires a username and password for authentication. By default, the WWWBoard package uses the username 'WebAdmin' and the password 'WebBoard'.
If the administrator changes the password the WWWBoard software by default will write the new password encrypted using crypt(3) in the file 'passwd.txt' in the same directory where the rest of the WWWBoard files are stored. This file must be readable and writable by the user id the WWWBoard package runs under. This is normally the same userid the web server runs under.
Since the directory where the WWWBoard files are stores is under the web root directory and remote client may retrieve file from it. This allows a remote malicious user to download the 'passwd.txt' file and to mount an attack against the password.
TREND MICRO PROTECTION INFORMATION
Download the latest NVW pattern file from this site:
https://www.trendmicro.com/download/product.asp?productid=45
AFFECTED SOFTWARE AND VERSION
- Matt Wright WWWBoard 2.0 Alpha 2
Featured Stories
Beware of MCP Hardcoded Credentials: A Perfect Target for Threat ActorsPoor secret management in MCP servers can lead to serious consequences, including data breaches and supply chain attacks. This article examines the reality of these unsecure configurations and offers practical recommendations that minimize the chances of exposure.Read more
Lessons in Resilience from the Race to Patch SharePoint VulnerabilitiesIn this article, Trend Micro discusses how the fast-moving attacks using CVE-2025-53770 and CVE-2025-53771 have underscored the essential role of virtual patching and reliable intelligence in protecting organizations against evolving threats.Read more
Unveiling AI Agent Vulnerabilities Part V: Securing LLM ServicesTo conclude our series on agentic AI, this article examines emerging vulnerabilities that threaten AI agents, focusing on providing proactive security recommendations on areas such as code execution, data exfiltration, and database access.Read more
Unveiling AI Agent Vulnerabilities Part IV: Database Access VulnerabilitiesHow can attackers exploit weaknesses in database-enabled AI agents? This research explores how SQL generation vulnerabilities, stored prompt injection, and vector store poisoning can be weaponized by attackers for fraudulent activities.Read more