根據(jù)以前的發(fā)現(xiàn),windowsNT密碼雖然不象Windows95那樣以簡單加密形式包含在一個文件里面,而是一些雜亂的暗碼,分別藏在7個不同的地方。這篇最新發(fā)表的文章告訴我們WindowsNT密碼隱藏的第八個地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
$ w: S A! b; B7 `# w8 a6 M4 f& X6 f, w/ A5 Y& ?- C# n9 _
From: Patrick CHAMBET <pchambet@club-internet.fr>- ~4 [ H7 T" Y5 U
$ p& j4 W: ^- @' r" G( RTo: sans@clark.net2 U# {& _4 r( ?8 l
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords7 i1 x) n5 N3 r
Hi all,
6 J$ }1 m1 d$ w% e( S& NWe knew that Windows NT passwords are stored in 7 different places across6 h \; u/ U7 Z( a4 R3 o% k
the system. Here is a 8th place: the IIS 4.0 metabase., C) S* `' f* L$ U
IIS 4.0 uses its own configuration database, named "metabase", which can: W/ c& V, l3 C! m
be compared to the Windows Registry: the metabase is organised in Hives,# l% [1 D% v9 c3 z& ?- h0 \1 d
Keys and Values. It is stored in the following file:$ O. G2 B, p. ?
C:\WINNT\system32\inetsrv\MetaBase.bin6 G' V7 k+ J5 h& X5 L
The IIS 4.0 metabase contains these passwords:
& a+ M- }6 o+ A, D- IUSR_ComputerName account password (only if you have typed it in the
) E+ A5 V$ ~3 n3 K( hMMC)8 z" z7 J$ M4 s# A( }% T) f5 ^
- IWAM_ComputerName account password (ALWAYS !)1 H3 I3 s- u8 u7 v
- UNC username and password used to connect to another server if one of
( q3 a5 e" o) L. [: Fyour virtual directories is located there.
* ~5 I; s$ C# a1 x( y- The user name and password used to connect to the ODBC DSN called' f2 M0 y6 k% X0 c x' m
"HTTPLOG" (if you chose to store your Logs into a database)./ [) W3 E) d0 E* E% @
Note that the usernames are in unicode, clear text, that the passwords are
8 `4 J( p) [0 Nsrambled in the metabase.ini file, and that only Administrators and SYSTEM
. C. ~- u4 \7 @! P; U& @have permissions on this file.
8 O, _% {" R$ \( K3 H5 _8 aBUT a few lines of script in a WSH script or in an ASP page allow to print5 q; Q4 E0 d6 c/ v, Q4 g
these passwords in CLEAR TEXT.
3 W5 A- {& Y. a m1 t6 sThe user name and password used to connect to the Logs DSN could allow a
9 y U( r9 ?: O! ]+ emalicious user to delete traces of his activities on the server.
& v) } m2 ], x( t) h5 b, fObviously this represents a significant risk for Web servers that allow% O- U6 m; N& [: N* Q2 g, B" F$ w
logons and/or remote access, although I did not see any exploit of the
4 V: a+ U0 Z* p. R5 \0 \problem I am reporting yet. Here is an example of what can be gathered:
X! G8 q4 N& s* S" J( ~* O"
# ^- b- M; O% G) z7 U' OIIS 4.0 Metabase- c o& f M1 o" T, z) g5 f1 P% o
?Patrick Chambet 1998 - pchambet@club-internet.fr8 `: A6 E' a, g5 w0 E5 z3 c5 o
--- UNC User ---7 O9 w: G- t2 ~! W+ P0 F8 s
UNC User name: 'Lou'! Y* S; w0 J, h+ ^, f6 b2 Z
UNC User password: 'Microsoft'" i* T+ d0 k0 F
UNC Authentication Pass Through: 'False'
8 P2 s% x/ d4 u% T* L" ]) W1 p; m/ B--- Anonymous User ---
) V2 F% ^, X* v( W, |" g8 I: b) JAnonymous User name: 'IUSR_SERVER'0 X: G# J" u( P6 @* m
Anonymous User password: 'x1fj5h_iopNNsp'/ B2 j$ N, t' p% a7 p! ?
Password synchronization: 'False'
( A7 g4 p Z9 I8 @! Q5 r--- IIS Logs DSN User ---
+ K# z0 ^7 |3 ]ODBC DSN name: 'HTTPLOG'
' `* _3 a0 a2 E$ |& n" eODBC table name: 'InternetLog'" h O" i$ D4 T U% ^/ Z6 n
ODBC User name: 'InternetAdmin'7 L0 Q6 R) x2 m6 C- Q9 r2 J: o
ODBC User password: 'xxxxxx'6 U# p" u3 h3 q5 m
--- Web Applications User ---$ A) v* W7 ^/ L% k) G& T& B
WAM User name: 'IWAM_SERVER'/ r2 m% O. E( ~& U5 G, j) B
WAM User password: 'Aj8_g2sAhjlk2'" J6 D' {2 Y2 m$ |/ T' B6 a
Default Logon Domain: ''
2 @" M# m g, B, p( b( F/ E" \"
& a, g3 p3 d& u6 V+ HFor example, you can imagine the following scenario:- e) p0 z; H) ^- B6 T3 E) l0 B$ o
A user Bob is allowed to logon only on a server hosting IIS 4.0, say
1 g9 d4 V- a* U& d0 e" M! _1 b t- b5 F9 Sserver (a). He need not to be an Administrator. He can be for example0 D# v4 l" n( P& F% W* M. h. H1 |
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts2 c/ {" O& z4 r# e9 V$ S
the login name and password of the account used to access to a virtual
+ ]9 f2 u9 _1 H9 T" C" Q: rdirectory located on another server, say (b).
& ~* Y7 V: b( _% H( Z6 {Now, Bob can use these login name and passord to logon on server (b).
/ k/ I0 q; D# z2 A) T4 ]And so forth...0 B3 a1 ?2 j3 q' p
Microsoft was informed of this vulnerability. k' ~8 @0 {% m* D! s9 I
_______________________________________________________________________& t5 ^# W- X% D+ i' j5 H+ g' O
Patrick CHAMBET - pchambet@club-internet.fr
- ~ j" j. U3 l9 jMCP NT 4.0" O4 k, M9 \1 z3 f7 U/ j5 p& G, g
Internet, Security and Microsoft solutions; ^ n! C6 L! y' A
e-business Services
' m7 d8 a6 @, @& f+ `# k- F$ WIBM Global Services0 D$ d# y4 Z, i; o
|