CGI_WWWBOARD_PASSWD_EXPLOIT
DESCRIPTION
A vulnerability in the default installation of the WWWBoard package allows remote attackers to steal the encrypted password of the WWWBoard admin. This allows the remote attackers to mount an off-line dictionary and brute force attack against the password. The WWWBoard package is a popular web based discussion board by Matt Wright. The administration area of the WWWBoard package requires a username and password for authentication. By default, the WWWBoard package uses the username 'WebAdmin' and the password 'WebBoard'.
If the administrator changes the password the WWWBoard software by default will write the new password encrypted using crypt(3) in the file 'passwd.txt' in the same directory where the rest of the WWWBoard files are stored. This file must be readable and writable by the user id the WWWBoard package runs under. This is normally the same userid the web server runs under.
Since the directory where the WWWBoard files are stores is under the web root directory and remote client may retrieve file from it. This allows a remote malicious user to download the 'passwd.txt' file and to mount an attack against the password.
TREND MICRO PROTECTION INFORMATION
Download the latest NVW pattern file from this site:
https://www.trendmicro.com/download/product.asp?productid=45
AFFECTED SOFTWARE AND VERSION
- Matt Wright WWWBoard 2.0 Alpha 2
Featured Stories
- Unveiling AI Agent Vulnerabilities Part IV: Database Access VulnerabilitiesHow can attackers exploit weaknesses in database-enabled AI agents? This research explores how SQL generation vulnerabilities, stored prompt injection, and vector store poisoning can be weaponized by attackers for fraudulent activities.Read more
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more