I have yet to be in an environment that this tactic could be reasonably be used.

Also it appears to me that Nessus security scanner seems to disagree about storing passwords in cleartext:

Nessus Plugin ID 11151
Bugtraq ID 5803
CVE ID CAN-2002-1521

Description:

The remote host is running Webserver 4D 3.6 or lower.

Version 3.6 of this service stores all usernames and passwords in cleartext.
File: C:Program FilesMDGWeb Server 4D 3.6.0Ws4d.4DD

A local attacker may use this flaw to gain unauthorized privileges
on this host.



Nessus Plugin ID 11758
Bugtraq ID 7535
CVE ID

Description:

The remote host is hosting eLDAPo, a PHP-based CGI
suite designed to perform LDAP queries.

This application stores the passwords to the LDAP server
in clear text in its source file. An attacker could read
the source code of index.php and may use the information
contained to gain credentials on a third party server.



Nessus Plugin ID 11649
Bugtraq ID 7646
CVE ID CAN-2003-0342

Description:

The remote host has the program BlackMoon FTP installed.

There is a design issue in the program which makes it store
the username and password of the FTP server in cleartext in
the file 'blackmoon.mdb'

Any user with an account on this host may read this file and
use the password to connect to this FTP server.



Nessus Plugin ID 11696
Bugtraq ID 7792
CVE ID

Description:

The remote web server is running IRCXPro.

This software stores the list of user names and passwords
in clear text in Program FilesIRCXProSettings.ini

An attacker with a full access to this host may use this flaw
to gain the list of passwords of your users.



Nessus Plugin ID 14285
Bugtraq ID
CVE ID

Description:

The remote host seems to be running cvstrac,
a web-based bug and patch-set tracking system for CVS.

This version contains a flaw related to *.db files that
may allow an attacker to gain access to plaintext passwords.



Nessus Plugin ID 11693
Bugtraq ID
CVE ID

Description:

The remote web server is running PFTP.

This software stores the list of user names and passwords
in clear text in Program FilesPFTPPFTPUSERS3.USR.

An attacker with a full access to this host may use this flaw
to gain access to other FTP servers used by the same use



Nessus Plugin ID 11627
Bugtraq ID 7563
CVE ID

Description:

The remote web server is running WebLogic 7.0 or 7.0.0.1.

There is a bug in this version which may allow a local attacker
to recover a WebLogic password if he can see the screen of the web logic
server.



Nessus Plugin ID 11640
Bugtraq ID
CVE ID CAN-2003-0329

Description:

The remote host has the program CesarFTP.exe installed.

There is a design issue in the program which makes it store
the username and password of the FTP server in cleartext in
the file 'settings.ini'.

Any user with an account on this host may read this file and
use the password to connect to this FTP server.



Nessus Plugin ID 11914
Bugtraq ID 5250
CVE ID

Description:

We were able to read the server.ini file
It may contain sensitive information like clear text passwords.
This flaw is known to affect TheServer.






----- Original Message ----- From: "Renaud Deraison" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Tuesday, March 08, 2005 7:03 AM
Subject: Re: Nessus wx-1.4.5a communication protocol tracer password revelation



On Tue, Mar 08, 2005 at 07:00:27AM -0500, Kevin Davis wrote:
So you expect the user to be competent enough to do something like encrypt
the .nessusrc files or put them on portable storage on their own (after
finding out they are stored in plaintext on their own) but not competent
enough to make sure someone is not looking over their shoulder when they
are entering passwords in the GUI?

Kevin, meet Binoculars. Binoculars, meet Kevin.

<http://images.google.com/images?q=binoculars&hl=en&btnG=Google+Search>


-- Renaud

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to