Also it appears to me that Nessus security scanner seems to disagree about storing passwords in cleartext:
Nessus Plugin ID 11151 Bugtraq ID 5803 CVE ID CAN-2002-1521
Description:
The remote host is running Webserver 4D 3.6 or lower.
Version 3.6 of this service stores all usernames and passwords in cleartext. File: C:Program FilesMDGWeb Server 4D 3.6.0Ws4d.4DD
A local attacker may use this flaw to gain unauthorized privileges on this host.
Nessus Plugin ID 11758 Bugtraq ID 7535 CVE ID
Description:
The remote host is hosting eLDAPo, a PHP-based CGI suite designed to perform LDAP queries.
This application stores the passwords to the LDAP server in clear text in its source file. An attacker could read the source code of index.php and may use the information contained to gain credentials on a third party server.
Nessus Plugin ID 11649 Bugtraq ID 7646 CVE ID CAN-2003-0342
Description:
The remote host has the program BlackMoon FTP installed.
There is a design issue in the program which makes it store the username and password of the FTP server in cleartext in the file 'blackmoon.mdb'
Any user with an account on this host may read this file and use the password to connect to this FTP server.
Nessus Plugin ID 11696 Bugtraq ID 7792 CVE ID
Description:
The remote web server is running IRCXPro.
This software stores the list of user names and passwords in clear text in Program FilesIRCXProSettings.ini
An attacker with a full access to this host may use this flaw to gain the list of passwords of your users.
Nessus Plugin ID 14285 Bugtraq ID CVE ID
Description:
The remote host seems to be running cvstrac, a web-based bug and patch-set tracking system for CVS.
This version contains a flaw related to *.db files that may allow an attacker to gain access to plaintext passwords.
Nessus Plugin ID 11693 Bugtraq ID CVE ID
Description:
The remote web server is running PFTP.
This software stores the list of user names and passwords in clear text in Program FilesPFTPPFTPUSERS3.USR.
An attacker with a full access to this host may use this flaw to gain access to other FTP servers used by the same use
Nessus Plugin ID 11627 Bugtraq ID 7563 CVE ID
Description:
The remote web server is running WebLogic 7.0 or 7.0.0.1.
There is a bug in this version which may allow a local attacker to recover a WebLogic password if he can see the screen of the web logic server.
Nessus Plugin ID 11640 Bugtraq ID CVE ID CAN-2003-0329
Description:
The remote host has the program CesarFTP.exe installed.
There is a design issue in the program which makes it store the username and password of the FTP server in cleartext in the file 'settings.ini'.
Any user with an account on this host may read this file and use the password to connect to this FTP server.
Nessus Plugin ID 11914 Bugtraq ID 5250 CVE ID
Description:
We were able to read the server.ini file It may contain sensitive information like clear text passwords. This flaw is known to affect TheServer.
----- Original Message ----- From: "Renaud Deraison" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Tuesday, March 08, 2005 7:03 AM
Subject: Re: Nessus wx-1.4.5a communication protocol tracer password revelation
On Tue, Mar 08, 2005 at 07:00:27AM -0500, Kevin Davis wrote:So you expect the user to be competent enough to do something like encrypt
the .nessusrc files or put them on portable storage on their own (after
finding out they are stored in plaintext on their own) but not competent
enough to make sure someone is not looking over their shoulder when they
are entering passwords in the GUI?
Kevin, meet Binoculars. Binoculars, meet Kevin.
<http://images.google.com/images?q=binoculars&hl=en&btnG=Google+Search>
-- Renaud
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus
_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
