25th Feb 2002 [SBWID-5138]
COMMAND
Greymatter remote login/pass exposure
SYSTEMS AFFECTED
Greymatter 1.21c and earlier
PROBLEM
In jericho \'security curmudgeon\' advisory [http://attrition.org] :
--snipp--
The big sign of GM being present is /cgi-bin/gm.cgi .. that is the
greymatter login screen and odds are GM is being run as root. Just
getting the password will let you post to the blogger, erase entries,
upload files and more. However, there are a lot of CGIs (listed below)
associated with the package, many could be vulnerable to the older
attacks.
Just search for a file called \"gmrightclick\" in google and download a
file called \"gmrightclick*.reg\" where the stars represent a number.
open it and there you have it: Username and Password for everyone to
use.
--snapp--
see refs :
http://foshdawg.net/forums/viewtopic.php?p=3D773#773
http://www.metafilter.com/comments.mefi/15039
http://www.dangerousmonkey.com/dangblog/dangarch/00000051.htm
http://www.cirt.net/nikto/
http://www.movabletype.org/
http://foshdawg.net/forums/index.php
SOLUTION
If the administrator uses the \"Add Bookmarklets\" feature to add a
link/photo, it will add a new \"gmrightclick*\" file unless they have
set the \"clear\" function in their configuration. After adding a link,
they need to hit the \"Clear And Exit\" button at the bottom of the
page. This will remove all \"gmrightclick*reg\" files.
Sites that customize their look/HTML will likely not have an open
/archive/ dir. Sites that use \"Master Archive\" option will not have a
browsable /archive/ directory. This will make it difficult to find the
file.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH