根據(jù)以前的發(fā)現(xiàn),windowsNT密碼雖然不象Windows95那樣以簡(jiǎn)單加密形式包含在一個(gè)文件里面,而是一些雜亂的暗碼,分別藏在7個(gè)不同的地方。這篇最新發(fā)表的文章告訴我們WindowsNT密碼隱藏的第八個(gè)地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
: H5 L F! F; H" u3 o- d
2 o6 \, t8 k& ?9 I( H& F" mFrom: Patrick CHAMBET <pchambet@club-internet.fr>
9 y4 k4 O4 Y9 \4 L: e! U7 m X8 q0 X/ G# T
To: sans@clark.net. ~9 \* Y: p! V7 w! q
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords( } U9 c2 M! j* u) T% q
Hi all,9 M; P5 s7 d4 [+ d* C& X' l
We knew that Windows NT passwords are stored in 7 different places across
, H' W( ~3 N5 Nthe system. Here is a 8th place: the IIS 4.0 metabase.
& V; B7 S: r" |! y3 [" Q- OIIS 4.0 uses its own configuration database, named "metabase", which can
/ P+ N" [1 l ~9 j4 xbe compared to the Windows Registry: the metabase is organised in Hives," a3 _+ z; ]8 b! W) ?+ e @+ {
Keys and Values. It is stored in the following file:* a: B0 _0 u: b+ m# U( P
C:\WINNT\system32\inetsrv\MetaBase.bin
- o( G* e7 f t- s* B% tThe IIS 4.0 metabase contains these passwords:
# s5 h5 v7 I% M Z' K* D- IUSR_ComputerName account password (only if you have typed it in the
% S4 B$ h- {4 V: d- }MMC) I& A& ~+ R8 ~, d
- IWAM_ComputerName account password (ALWAYS !)$ {& G7 D9 Q8 A- p
- UNC username and password used to connect to another server if one of* x$ o4 A ^- R& {3 |! h
your virtual directories is located there." d7 I8 s' B9 u3 E, }3 ^: t+ A a
- The user name and password used to connect to the ODBC DSN called% X' X7 q4 {( }6 ?/ J# D
"HTTPLOG" (if you chose to store your Logs into a database).9 F+ `+ j( c- A$ C
Note that the usernames are in unicode, clear text, that the passwords are% u; u6 \( }& A. d2 e
srambled in the metabase.ini file, and that only Administrators and SYSTEM5 M: |- v1 R- t5 R3 ?& q7 Q
have permissions on this file., Q. g. ? z* S2 c+ j6 d
BUT a few lines of script in a WSH script or in an ASP page allow to print
! X) q0 h8 O2 {these passwords in CLEAR TEXT.3 p. K+ j, a+ Y' ]; U
The user name and password used to connect to the Logs DSN could allow a% V4 v4 G8 f/ [$ ~; y; i9 t+ a
malicious user to delete traces of his activities on the server.) E/ c5 }+ y; B& H0 z+ i7 Q4 b) Q
Obviously this represents a significant risk for Web servers that allow
( a2 Z/ u$ _! d: A W7 K( klogons and/or remote access, although I did not see any exploit of the, q4 o1 C) c8 b, ]* n
problem I am reporting yet. Here is an example of what can be gathered:
K! x/ x8 G, f9 C2 Z) g* ?9 ?"
: _# Q7 U4 q CIIS 4.0 Metabase, Z! S% d: T% c, k" N$ a# [) g
?Patrick Chambet 1998 - pchambet@club-internet.fr
) K! F, v% E; T9 P9 p* x# D--- UNC User ---0 M9 y P( M8 g7 R
UNC User name: 'Lou'
2 I8 M4 P9 D% K* r4 k% k: qUNC User password: 'Microsoft'
- \1 k0 f7 l: b+ {UNC Authentication Pass Through: 'False'
* A# W( y* E8 h/ \) V# Z& k3 i--- Anonymous User ---
7 J% b) r- S" W! V3 u% H$ VAnonymous User name: 'IUSR_SERVER'
[, z' ?' `$ R( Q3 S2 e) f# S zAnonymous User password: 'x1fj5h_iopNNsp'6 F5 \0 D) O2 y4 }5 E* z+ d. M+ z
Password synchronization: 'False'" F8 J% g5 p" u- ?
--- IIS Logs DSN User ---
! _# W1 V2 S# }( ]( Q, U IODBC DSN name: 'HTTPLOG'/ U/ i, |& o* t* ~$ r' K. }
ODBC table name: 'InternetLog'
1 h+ X, V A* p. p8 k$ |ODBC User name: 'InternetAdmin': L4 |9 c& P p# X/ E3 J7 J
ODBC User password: 'xxxxxx'( ]) e; g9 Q0 p8 g
--- Web Applications User ---. W9 R+ g5 S) v1 d$ O+ g ]9 n
WAM User name: 'IWAM_SERVER' i* {) d8 P) X
WAM User password: 'Aj8_g2sAhjlk2'
4 f* e! d: g! I; f6 x; }Default Logon Domain: ''& ]. ^+ D9 ^! ]% L, s: c
"! z) E/ d8 i9 j0 n: }$ {3 D0 u
For example, you can imagine the following scenario:' T: q- A I3 p" h. i! V( {& O
A user Bob is allowed to logon only on a server hosting IIS 4.0, say& q# ]. N3 H8 ^! x7 L" A1 t
server (a). He need not to be an Administrator. He can be for example! Q' [8 r3 C" d: Z
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
* ]: ~9 v5 I* O- T0 l* y9 Kthe login name and password of the account used to access to a virtual6 y5 j+ i, \2 A1 K% _- }9 V j
directory located on another server, say (b).2 [/ r8 P$ N/ n! F6 p* _6 ^5 J
Now, Bob can use these login name and passord to logon on server (b).
w, w, \: p6 _+ D! X# P7 kAnd so forth...
, C& X/ a$ X% O* oMicrosoft was informed of this vulnerability.
: M* b8 a) p5 \0 g; M! T_______________________________________________________________________
# v7 @& q5 W- o( U) J7 yPatrick CHAMBET - pchambet@club-internet.fr+ o+ ~/ W. I Z7 T0 c8 P
MCP NT 4.0& L9 ^" [, \" h8 i1 V8 k
Internet, Security and Microsoft solutions
* m; z) {0 b, }- Z. N0 se-business Services
9 ^( a) A) t0 \8 n2 eIBM Global Services/ i, m4 M* c9 u8 _0 I$ g
|