TUCoPS :: Web BBS :: etc :: wthreads.htm

Wwwthreads up to 2.7.3 plaintext admin passwords!
Vulnerability

    wwwthreads

Affected

    Systems using WWW Threads up to v2.7.3

Description

    Ken Williams found  following.  The  WWW Threads discussion  forum
    software from:

        http://www.screamingweb.com/wwwthreads/

    several security holes  and coding weaknesses.   When running  the
    install script,  the data  directories are  created in  a publicly
    accessible  area.   The  install  instructions  direct the user to
    create  the  data  directory  in  a  publicly accessible directory
    under "html" or "public_html" also.  The data directories contain,
    among other things, administrator  and user logins and  passwords.
    These passwords are written to  files in plaintext, and the  files
    can  easily  be  viewed  and/or  downloaded  by  anyone with a web
    browser.  It seems  there are no error  or bounds checking in  the
    administrative cgi scripts either,  so exploit code can  easily be
    executed remotely once the plaintext passwords are retrieved.

    These bugs  and security  holes are  present in  the latest bugfix
    release  of  WWW  Threads  (wwwthreads  v2.7.3),  and  all earlier
    releases that have been checked (2.6.* and 2.7.*).

Solution

    Suggested fixes:

    1) move the data  directories to non-publicly accessible  area and
       correct the appropriate lines in the cgi scripts.
    2) remove all (g) and (o) permissions to prevent local exploit.
    3) use the  UNIX crypt() function  or something similar  to encode
       passwords written to files.
    4) add  a "referer"  variable to  the cgi  scripts so commands can
       only be executed on local server that has WWW Threads installed

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH