Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Outlook Web anonymous access


Vulnerability Assessment Details

Outlook Web anonymous access

Vulnerability Assessment Summary
Outlook Web anonymous access

Detailed Explanation for this Vulnerability Assessment

It is possible to browse the information of the OWA server by accessing as an
anonymous user with the following URL:

http://www.example.com/exchange/root.asp?acs=anon

After this access, the anonymous user can search for valid users in the OWA
server and can enumerate all users by accessing the following URL:

http://www.example.com/exchange/finduser/details.asp?obj=XXX
(where XXX is a string of 65 hexadecimal numbers)

Data that can be accessed by an anonymous user
may include: usernames, server names, email name accounts,
phone numbers, departments, office, management relationships...

This information will help a possible hacker to make social
engineering attacks with the knowledge gained. This attack
can be easily automated since, even if direct access to search
is not possible, you only need the cookie given on the anonymous
login access.

Administrators might be interested in consulting
the following URL:

http://support.microsoft.com/support/exchange/content/whitepapers/owaguide.doc

Solution:
Disable anonymous access to OWA. Follow these steps:
1. In Microsoft Exchange Administrator open the Configuration container.
2. Choose Protocols, and then double-click HTTP (Web) Site Settings
3. Unselect the 'Allow anonymous users to access
the anonymous public folders' check box.
4. Select the Folder Shortcuts tab.
5. Remove all folders which are permited anonymous viewing.
6. Choose OK.
7. Remove the anonymous access from the login web pages.

Network Security Threat Level: Medium

Networks Security ID: 3301

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Javier Fernndez-Sanguino Pea

Cables, Connectors

Lenovo Yoga Book 10” Touch 2-in-1 x5-Z8550 4GB/64GB YB1-X90F Tablet Grey Android
$249.0
Lenovo Yoga Book 10” Touch 2-in-1 x5-Z8550 4GB/64GB YB1-X90F Tablet Grey Android pictureLENOVO THINKSERVER RD450 E5-2650V3 2.3GHZ 32GB 2133MHZ LRDIMM 500GB SATA
$1879.0
LENOVO THINKSERVER RD450 E5-2650V3 2.3GHZ 32GB 2133MHZ LRDIMM 500GB SATA pictureLENOVO THINKSERVER RD650 E5-2620V4 2.1GHZ 64GB NO HDD
$2259.0
LENOVO THINKSERVER RD650 E5-2620V4 2.1GHZ 64GB NO HDD pictureIBM SYSTEM X3650 M4 2.5 SERVER TWO E5-2630V2 2.60GHZ 192GB 2 X 146GB 15K SAS M51
$4649.0
IBM SYSTEM X3650 M4 2.5 SERVER TWO E5-2630V2 2.60GHZ 192GB 2 X 146GB 15K SAS M51 picture


Discussions

No Discussions have been posted on this vulnerability.