CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Frontpage Extensions Directory _vti_pvt Present

2016年9月26日 967点热度 0人点赞 0条评论

漏洞类别:Web server漏洞等级:

漏洞信息

The remote Web server appears to be running with Frontpage Extensions. On a default installation of Frontpage Extensions, a virtual directory /_vti_pvt/ is created. It may contain configuration files and encrypted password files.

Unspecified versions of Frontpage Extensions for Unix have been reported to create a readable (and occasionally writable) file called "services.pwd", which contains encrypted password and account information.

There are also unspecified versions of Frontpage Extensions that create a file "/_vti_pvt/administrators.pwd", which often has improper permissions set. Unauthorized users could retrieve this file via the following URL:

http://www.example.org/_vti_pvt/administrators.pwd"

Note that the detection of the presence of a directory is for the most part based on the return code in the HTTP responses to the HTTP requests such as "GET /directory/ HTTP/1.0" and may at times be unreliable.

漏洞危害

Some configuration files and encrypted password files can be retrieved from the system. If weak passwords were chosen, then unauthorized users may be able to guess them.

解决方案

You should check your configuration because several security problems have been discovered with FrontPage when the configuration file is not well set up. Apply better permissions on the Frontpage Extension Directories.

You should also make sure that you're using a strong password. Use the following guidelines to create a strong password:

  • Use at least eight characters.
  • Use a mix of four different types of characters (upper case letters, lower case letters, numbers and special characters, such as !@#$%^&*,;").
  • If you're only using one special character, then it should not be the first or last character in the password.
  • Do not use a name, slang word, or any word in the dictionary.
  • Do not include any part of your name or your e-mail address.

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me