Beehive/SendFile.NET - Secure File Transfer Appliance Hardcoded Credentials

2008.03.04
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

Title: Beehive/SendFile.NET - Secure File Transfer Appliance Hardcoded Credentials Vendor: Beehive Software Vendor URL: http://www.thebeehive.com/ Affected File: http://<host>/sfcommon/SendFile.jar Vendor Contact Date: 7/26/2007 Vendor Response: None Workaround: The simplest way to protect against this attack is to block access to unnecessary services (e.g FTP) from the internet. Description: Within the outboxWriteUnsent() function of the FTPThread.class file of SendFile.jar the following lines reveal a hardcoded username and password which can be used to login to the FTP Server. Most servers disallow direct communication to the appliance from the internet however threats from the internal network still exist. SendFile.jar: ------------<snip>------------ URL url1 = new URL(url.getProtocol() + "://" + url.getHost() + "/s.ftp?command=putfile&user=sfoutbox&pass=sfoutbox&dir=" + mAcctID + "/" + FTPStream.escapePathName(mUser) + "&createdir=1&file=" + mOutboxTime + ".unsent.html"); ------------</snip>------------ And ------------<snip>------------ ftpstream = new FTPStream(mApplet.getDocumentBase().getHost(), "sfoutbox", "sfoutbox", true, false, mProgressWindow, false, mProxyIP, mProxyPort, mProxyUser, mProxyPass); ------------</snip>------------ Credit: Brad Antoniewicz Email: Brad.Antoniewicz at foundstone.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top