根據(jù)以前的發(fā)現(xiàn),windowsNT密碼雖然不象Windows95那樣以簡(jiǎn)單加密形式包含在一個(gè)文件里面,而是一些雜亂的暗碼,分別藏在7個(gè)不同的地方。這篇最新發(fā)表的文章告訴我們WindowsNT密碼隱藏的第八個(gè)地方。Date: Mon, 22 Feb 1999 11:26:41 +01005 \7 d0 V. l. a# d/ b( _: A0 M
7 J7 ~& S/ A; i, L. l; t" QFrom: Patrick CHAMBET <pchambet@club-internet.fr>
a2 U0 w- O+ _$ o
! V) t p4 ~& C6 S6 STo: sans@clark.net
" ?3 d8 n0 w! W4 D: M: u, Z1 PSubject: Alert: IIS 4.0 metabase can reveal plaintext passwords
* J* `+ {, @' r8 L) S: Z* M6 OHi all,6 q( z0 i! W, ^+ ]* [, W
We knew that Windows NT passwords are stored in 7 different places across! o F* e# ]3 K
the system. Here is a 8th place: the IIS 4.0 metabase.
7 Z5 I& M4 F0 x' A% pIIS 4.0 uses its own configuration database, named "metabase", which can1 c+ l, N4 v) @0 K6 ~$ u8 l
be compared to the Windows Registry: the metabase is organised in Hives,
- a8 u: G' i( b" rKeys and Values. It is stored in the following file:+ ^/ q3 K8 a! U
C:\WINNT\system32\inetsrv\MetaBase.bin# `3 f j8 ^7 x# ~! n6 t
The IIS 4.0 metabase contains these passwords:
& F0 I; |/ H, d/ u- o- IUSR_ComputerName account password (only if you have typed it in the
! u0 j0 A& Y% _0 s9 C) {4 _MMC)
2 q |# O0 L' r# J- IWAM_ComputerName account password (ALWAYS !)3 P7 o5 l0 R! ?, F
- UNC username and password used to connect to another server if one of
: A! |; J. I$ \your virtual directories is located there.6 {. i1 q2 p; [; e
- The user name and password used to connect to the ODBC DSN called
" u9 e2 t2 G9 ^) o5 g8 _7 K8 {5 `4 C"HTTPLOG" (if you chose to store your Logs into a database)., r" ^3 C* j' n2 C+ k9 q2 J3 t! ^
Note that the usernames are in unicode, clear text, that the passwords are1 b( U* o0 j% S
srambled in the metabase.ini file, and that only Administrators and SYSTEM5 i7 X" u/ r# Q$ U9 H0 }
have permissions on this file.) E+ T9 }# l; {; r% p: r3 Q; z
BUT a few lines of script in a WSH script or in an ASP page allow to print
9 m F1 I T6 k! _ v6 y/ k* ^; }. rthese passwords in CLEAR TEXT.2 ]# m! |. k# z
The user name and password used to connect to the Logs DSN could allow a1 @. K& k9 E! y0 T
malicious user to delete traces of his activities on the server.
; `# S: X& ^7 X) K6 iObviously this represents a significant risk for Web servers that allow& `( n" z j+ j6 B. \3 E
logons and/or remote access, although I did not see any exploit of the
# O! ^, M9 r4 e8 g9 tproblem I am reporting yet. Here is an example of what can be gathered:
$ ?' Y. q0 x/ y( w, v", A' z6 p8 M2 I4 S7 n
IIS 4.0 Metabase B, J& V, G8 C* h# E3 s. t3 J( l
?Patrick Chambet 1998 - pchambet@club-internet.fr% a% p3 o/ U6 q- z! t9 R
--- UNC User ---
6 E- h V/ A; JUNC User name: 'Lou'9 t- k+ L( z4 _+ P5 y5 G
UNC User password: 'Microsoft') `' C& b4 j+ @6 ]* ]4 I
UNC Authentication Pass Through: 'False'
" K* I2 f2 I1 S# r8 u o! `--- Anonymous User ---
) L( b% z7 {# r4 b) c9 R, JAnonymous User name: 'IUSR_SERVER'
. [* x% h4 v0 B x& V( hAnonymous User password: 'x1fj5h_iopNNsp'# q/ ~2 o3 n. @$ ^
Password synchronization: 'False'2 ^+ q- H0 u5 i" }" B
--- IIS Logs DSN User ---
0 k, `9 P0 i" q: z: t7 iODBC DSN name: 'HTTPLOG'! h Q Y) l3 j5 T0 s. h* d
ODBC table name: 'InternetLog'! e$ I4 i1 i- J$ `2 s
ODBC User name: 'InternetAdmin'6 K4 S3 [$ ]# D3 x1 h5 v! Z
ODBC User password: 'xxxxxx'
6 [2 x/ Q& y# y4 K--- Web Applications User ---$ s% D! L: r! Y" T* `9 o
WAM User name: 'IWAM_SERVER'
@/ ~, x+ X, G" t) VWAM User password: 'Aj8_g2sAhjlk2'
2 j0 }- q( n7 f2 N; UDefault Logon Domain: ''+ }4 n$ t1 F+ S" u- e
"% f8 Z7 s3 W, C8 n
For example, you can imagine the following scenario:% L1 D8 H4 W' V# c0 n
A user Bob is allowed to logon only on a server hosting IIS 4.0, say+ E2 |1 a4 c3 m9 O, f
server (a). He need not to be an Administrator. He can be for example
& a# M& n5 N" van IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts% G! f1 R) J6 v' {) k
the login name and password of the account used to access to a virtual
, v1 N% x& _- u' e& F3 k l: Cdirectory located on another server, say (b).
2 H8 D$ z3 ?: MNow, Bob can use these login name and passord to logon on server (b).
, t7 r3 L( Z5 U q& mAnd so forth...; f- _. u: z, q7 ~
Microsoft was informed of this vulnerability.
9 D( P) g9 j4 f7 f( b. u* \6 o_______________________________________________________________________9 D) ?* a3 I2 C0 ~
Patrick CHAMBET - pchambet@club-internet.fr. A/ U: j- Y$ G t7 \2 i# {) l+ p
MCP NT 4.0
3 k1 k+ ~" \" s [1 |3 I( JInternet, Security and Microsoft solutions
( `0 G9 C/ I2 ^) j8 He-business Services; R' h: S( U D
IBM Global Services! w! t4 {# B3 k) R
|