根據(jù)以前的發(fā)現(xiàn),windowsNT密碼雖然不象Windows95那樣以簡(jiǎn)單加密形式包含在一個(gè)文件里面,而是一些雜亂的暗碼,分別藏在7個(gè)不同的地方。這篇最新發(fā)表的文章告訴我們WindowsNT密碼隱藏的第八個(gè)地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
; C, J9 O8 X9 l3 I
0 S( J& |9 ]& ZFrom: Patrick CHAMBET <pchambet@club-internet.fr>
; R$ J7 x/ X! }/ N2 o. k7 n- u# B
To: sans@clark.net# S% w1 y% c0 \
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords& X+ O/ n4 v. U$ H& o( K
Hi all,
& m x" ~: X% X! pWe knew that Windows NT passwords are stored in 7 different places across' y* r# Z& d6 z* j' w# X9 ^1 g
the system. Here is a 8th place: the IIS 4.0 metabase., v a- U8 S( Z! A
IIS 4.0 uses its own configuration database, named "metabase", which can7 L% n' t5 D- B
be compared to the Windows Registry: the metabase is organised in Hives,6 ^4 n$ X; t( H/ `- y
Keys and Values. It is stored in the following file:& Y7 V* i( j, }/ s, \3 S
C:\WINNT\system32\inetsrv\MetaBase.bin
7 G) N9 q; X: h5 P$ w+ p6 t% l1 p2 |5 e, @The IIS 4.0 metabase contains these passwords:
- c N T/ R/ Y3 _- IUSR_ComputerName account password (only if you have typed it in the
+ h3 X+ ?8 x6 lMMC). b4 Q9 U! h$ T+ C# B9 P" u$ N
- IWAM_ComputerName account password (ALWAYS !)8 T- z$ g- Z6 H% @. o' g/ E+ F
- UNC username and password used to connect to another server if one of
" l" s+ J3 B8 G# @. S myour virtual directories is located there.( R/ O4 z. R2 d8 x% ?/ i8 L4 F
- The user name and password used to connect to the ODBC DSN called
9 u: s2 ~" S0 X, C5 @& p0 |( g"HTTPLOG" (if you chose to store your Logs into a database).
) q+ D; K" r% J. ?. B4 z jNote that the usernames are in unicode, clear text, that the passwords are
6 ]8 J* H$ b. c6 e0 D# i; Qsrambled in the metabase.ini file, and that only Administrators and SYSTEM0 P* P- R" g3 \+ S* |8 Z
have permissions on this file.$ O h% A# V2 N! K& _! ? d
BUT a few lines of script in a WSH script or in an ASP page allow to print, C7 X; m8 F) y5 p
these passwords in CLEAR TEXT.
8 ^+ }: w" F/ Q- R8 n5 RThe user name and password used to connect to the Logs DSN could allow a. r- I+ U! S+ z
malicious user to delete traces of his activities on the server.0 I5 v" T" R' l# E. G
Obviously this represents a significant risk for Web servers that allow
' [2 j6 C1 h, a/ @logons and/or remote access, although I did not see any exploit of the
8 M, B( j3 a; [problem I am reporting yet. Here is an example of what can be gathered:- v1 M7 N& G- J; r9 d2 j. T! Q
"# _: [3 r; n8 K% [# r( q7 w' n
IIS 4.0 Metabase. l" b% Z, w" Z# t
?Patrick Chambet 1998 - pchambet@club-internet.fr% [0 k2 q9 J8 W. M+ q
--- UNC User ---' \ Q. }% v, Z5 p. B& j6 P5 t& e
UNC User name: 'Lou'; F8 S6 j4 p' b4 k! f
UNC User password: 'Microsoft'
+ u# K* S, f: w: C7 A2 E% s4 TUNC Authentication Pass Through: 'False'0 ]" L R" x8 s& L) W
--- Anonymous User ---- f- p9 T+ U! o" L+ X
Anonymous User name: 'IUSR_SERVER', V0 U% j/ ?+ W7 r5 m0 R9 U4 z
Anonymous User password: 'x1fj5h_iopNNsp'
+ \# R4 s- V9 R. z- gPassword synchronization: 'False'
* J: \. K: D+ f! H--- IIS Logs DSN User ---
% q8 a2 n- ?8 i4 @' m$ T0 N" q0 SODBC DSN name: 'HTTPLOG'0 ?5 [; z; E% w9 p% B2 y
ODBC table name: 'InternetLog'
6 p$ c$ R* R( S- t+ lODBC User name: 'InternetAdmin'7 h2 N3 { e1 K- c
ODBC User password: 'xxxxxx'/ |) E: \2 T+ \, o4 a5 Z, P9 i( m+ L
--- Web Applications User ---
0 v9 A! Q. J! M0 Y- r% X& JWAM User name: 'IWAM_SERVER'
1 U2 h& ?! J9 a5 P* `* }WAM User password: 'Aj8_g2sAhjlk2'( L9 g4 j+ n" _' ^" P) C9 g: u) J! n
Default Logon Domain: ''4 {) q0 Y7 V( M9 F$ t A: s
"
% k9 Q" E1 [% B9 K. y) ]For example, you can imagine the following scenario:
2 P5 M, R* v- p2 k9 PA user Bob is allowed to logon only on a server hosting IIS 4.0, say
: t8 p3 D, n! V* M& a$ r1 Zserver (a). He need not to be an Administrator. He can be for example1 s+ `5 W# j& m* k) \
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts& i6 r! L2 ]* t$ U( V( P, q, u
the login name and password of the account used to access to a virtual
. h* v, z" L0 d3 u5 O' y+ H" q; |# Z$ Adirectory located on another server, say (b)." p6 j: [8 L1 S0 H$ M( g3 y& n- `
Now, Bob can use these login name and passord to logon on server (b).! l: H& a+ X) D9 e3 r- \
And so forth...3 N. R% i) H, ^
Microsoft was informed of this vulnerability.
2 a/ t# [' s% v% ] U_______________________________________________________________________% M4 g/ N. d3 v1 @8 h8 y
Patrick CHAMBET - pchambet@club-internet.fr# }/ p4 h$ _6 i* Y# h8 z9 T
MCP NT 4.0
3 c/ V% R) V; ?5 ~. [7 cInternet, Security and Microsoft solutions4 a( u Y9 R; Y5 E+ N5 D2 A5 V1 [
e-business Services
; e# W0 F4 m$ }0 G- W7 Y# kIBM Global Services
6 `6 o; x( t* [, j |