根據(jù)以前的發(fā)現(xiàn),windowsNT密碼雖然不象Windows95那樣以簡(jiǎn)單加密形式包含在一個(gè)文件里面,而是一些雜亂的暗碼,分別藏在7個(gè)不同的地方。這篇最新發(fā)表的文章告訴我們WindowsNT密碼隱藏的第八個(gè)地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
. j$ o4 U+ O8 [# T! N' q$ k& L( E
From: Patrick CHAMBET <[email protected]>
* j. O6 s/ G9 M+ s& V% N" _
" |" \1 l; w9 a h- U0 _To: [email protected]3 t! j+ z& u, Z/ [: [* c
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords1 d: q1 E+ q! l* c* N4 E
Hi all,
1 |+ B0 t6 V I: x! `; \* P$ ^We knew that Windows NT passwords are stored in 7 different places across0 @5 |6 u& Q& U5 [4 f+ j2 b1 E4 g
the system. Here is a 8th place: the IIS 4.0 metabase.0 U; U/ H' `, l
IIS 4.0 uses its own configuration database, named "metabase", which can; F" k4 ^) K' |8 y
be compared to the Windows Registry: the metabase is organised in Hives,8 Z. r8 L; w1 a8 L
Keys and Values. It is stored in the following file:
$ g$ o! L0 b2 gC:\WINNT\system32\inetsrv\MetaBase.bin- h" H/ b* c2 o9 m
The IIS 4.0 metabase contains these passwords:
! u+ m. z1 ]; }) p) a8 S P& }- IUSR_ComputerName account password (only if you have typed it in the
* \# N, V9 d) i2 M7 f" \1 zMMC); \. E# X! L* ?, G# P9 d
- IWAM_ComputerName account password (ALWAYS !)
' t9 ?; e" K5 L/ {( C% t- UNC username and password used to connect to another server if one of) ^$ z7 n- h7 k3 v; \; }
your virtual directories is located there.
+ U4 L/ k8 z& T+ }- The user name and password used to connect to the ODBC DSN called
2 K# s8 h% l. ^0 D) E6 ["HTTPLOG" (if you chose to store your Logs into a database).% p. X% r. \) k* ~' @% k; O
Note that the usernames are in unicode, clear text, that the passwords are0 D( d0 D9 I3 r2 z
srambled in the metabase.ini file, and that only Administrators and SYSTEM$ M4 P/ v: X# Y, d" q q
have permissions on this file.1 G5 k' S* B4 a9 q5 `
BUT a few lines of script in a WSH script or in an ASP page allow to print
0 ?8 u3 w- `) u# G% c) a$ g( n0 Y% Zthese passwords in CLEAR TEXT.
x8 u3 f# ]2 s$ b' y( C8 F iThe user name and password used to connect to the Logs DSN could allow a
' D3 I% I/ P) U* `" j3 g3 T+ {; Tmalicious user to delete traces of his activities on the server.
9 e0 M5 x1 s" [ l& X9 sObviously this represents a significant risk for Web servers that allow
2 _1 I& Y0 j- a& A* z6 L1 klogons and/or remote access, although I did not see any exploit of the4 X! f) |; O1 m3 Y. J5 G
problem I am reporting yet. Here is an example of what can be gathered:; K' t1 @- |! R5 s! q% n- u! \
"2 c/ a& t& \/ `, a& X2 h: o
IIS 4.0 Metabase
0 @7 L# @+ f# h! Y0 @+ I! \?Patrick Chambet 1998 - [email protected]
: o& ]3 F: `! {& f--- UNC User ---
+ S- [* p# {# h* V! }* e" I9 bUNC User name: 'Lou'# Z3 n2 e' K* Y# u+ O6 W5 V! R5 D
UNC User password: 'Microsoft'& i$ W9 p, E {% ~) y
UNC Authentication Pass Through: 'False'" m7 j9 T2 S$ u; b3 ~6 J: M# m
--- Anonymous User ---' o8 w, Y( ~ E2 ~" n; |
Anonymous User name: 'IUSR_SERVER'
& t) `" P; ]' I9 HAnonymous User password: 'x1fj5h_iopNNsp'9 _3 a/ R' e) c( R' ^
Password synchronization: 'False'
/ o& ^5 \( `, H3 p. U! A$ [# r--- IIS Logs DSN User ---! c, V4 z" B7 m/ x2 z
ODBC DSN name: 'HTTPLOG'
! ~1 F2 ]) n' U4 SODBC table name: 'InternetLog'
- L$ r7 [# E" r v6 cODBC User name: 'InternetAdmin'
2 l9 K2 r: ?. R" ^6 g! x( XODBC User password: 'xxxxxx'/ U7 }% o2 ?# ^8 [
--- Web Applications User ---
' d& e) U( R* u' g+ `8 zWAM User name: 'IWAM_SERVER'/ e2 j1 ^$ K5 n# o. G' {
WAM User password: 'Aj8_g2sAhjlk2'
5 O% w- H+ d& X7 U: m+ |' VDefault Logon Domain: ''3 V }0 Y, {9 s5 b: m
"+ T, G5 u6 G9 ?1 B# m' M; A. b
For example, you can imagine the following scenario:3 T3 V1 A1 V1 J3 d; K; r! G
A user Bob is allowed to logon only on a server hosting IIS 4.0, say% o5 G+ I, e! E
server (a). He need not to be an Administrator. He can be for example' p% Q! o8 X. Q$ p+ a' V! p* {
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts1 ^) C5 u2 C/ u- a+ o$ L
the login name and password of the account used to access to a virtual7 w$ y9 ]6 }( c0 {9 v' p* {
directory located on another server, say (b).: ]! a; I% r4 P
Now, Bob can use these login name and passord to logon on server (b).; _% X. l) a' u+ H2 a& n; f
And so forth..." M0 t1 ]' j( S1 C' c% C. L* P1 }
Microsoft was informed of this vulnerability.- e F/ M) M: u8 h% y4 m+ g
_______________________________________________________________________' v, I6 C# M1 q7 @0 M
Patrick CHAMBET - [email protected]
% g3 p: T6 j/ U) e9 p4 ]( g7 TMCP NT 4.0. d' N, S. e& V, E0 b- |2 E
Internet, Security and Microsoft solutions- F' v' Z( [( B: M
e-business Services- Q* e* g9 \2 |' F$ V1 T
IBM Global Services
9 l& n% x; F% ?1 J5 }4 t. |. G |