Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> WF-Chat User Account Disclosure


Vulnerability Assessment Details

WF-Chat User Account Disclosure

Vulnerability Assessment Summary
Searches for the existence of !pwds.txt

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a CGI application that is prone
to information disclosure.

Description :

The WF-Chat permits a possible hacker to view information about registered
users by requesting the files '!nicks.txt' and '!pwds.txt'.

See also :

http://lists.insecure.org/lists/bugtraq/2003/Mar/0271.html

Solution :

Delete this CGI.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)

Networks Security ID: 7147

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Network Security

Cables, Connectors

1972 Electronic Hybrid & Analog Computers PACE EAI Berkeley EASE Philbrick K2-W
$34.0
1972 Electronic Hybrid & Analog Computers PACE EAI Berkeley EASE Philbrick K2-W pictureBINAC SEAC LGP-30 CDC 1604 IBM 360 Whirlwind UNIVAC Burroughs Analog Computers
$32.0
BINAC SEAC LGP-30 CDC 1604 IBM 360 Whirlwind UNIVAC Burroughs Analog Computers picture1960 Analog Computers 650pg Tube Op Amp Design Philbrick K2-W PACE EAI 680 TR-48
$32.0
1960 Analog Computers 650pg Tube Op Amp Design Philbrick K2-W PACE EAI 680 TR-48 pictureXitel Inport Stereo Audio Recording Kit USB Import Analog to Computer *No Cable
$21.99
Xitel Inport Stereo Audio Recording Kit USB Import Analog to Computer *No Cable picture


Discussions

No Discussions have been posted on this vulnerability.