根據(jù)以前的發(fā)現(xiàn),windowsNT密碼雖然不象Windows95那樣以簡單加密形式包含在一個(gè)文件里面,而是一些雜亂的暗碼,分別藏在7個(gè)不同的地方。這篇最新發(fā)表的文章告訴我們WindowsNT密碼隱藏的第八個(gè)地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
) P3 t, z4 R0 _4 Z# c. G8 k) W& J0 p+ `. O% s! s# g
From: Patrick CHAMBET <pchambet@club-internet.fr>
5 B4 ]0 F7 |6 ?/ B' p1 k" J- F3 t3 ^! R6 _. q. Z, R3 q. S. v
To: sans@clark.net$ X1 X8 u! p% Z
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords. M3 g# t4 W4 k% Z) G4 {8 N
Hi all,& M! L# W+ h7 E0 h7 Y7 G7 _' h1 V7 b6 _
We knew that Windows NT passwords are stored in 7 different places across, I5 X8 ?. H+ K( t/ p
the system. Here is a 8th place: the IIS 4.0 metabase.* l0 ?) O! g, Z% T
IIS 4.0 uses its own configuration database, named "metabase", which can5 j$ w8 X! p% t. i
be compared to the Windows Registry: the metabase is organised in Hives,
M+ v$ L% q) KKeys and Values. It is stored in the following file:
! \" |9 {& Q6 X$ L; P( DC:\WINNT\system32\inetsrv\MetaBase.bin
& [/ c0 D1 Y1 z/ x4 m. rThe IIS 4.0 metabase contains these passwords:( R8 i: c; Y# ~0 S; X T
- IUSR_ComputerName account password (only if you have typed it in the( g) n- O& U0 R, r: o+ L& m) N
MMC)9 i! U2 G+ g; [% R+ |: l1 a5 ?
- IWAM_ComputerName account password (ALWAYS !). R4 C5 ]6 F9 x; p6 Y
- UNC username and password used to connect to another server if one of, ^9 W7 Q$ x8 Y; H4 L
your virtual directories is located there.- \) f) A% F( b8 X& _
- The user name and password used to connect to the ODBC DSN called
+ X% {( {9 o! m0 K& a/ I* P* N"HTTPLOG" (if you chose to store your Logs into a database).( y% J( h: j! Y
Note that the usernames are in unicode, clear text, that the passwords are
. f) p. q" @' b" x* R& F$ o' Z7 bsrambled in the metabase.ini file, and that only Administrators and SYSTEM4 }+ Z$ m- }* R
have permissions on this file.
1 {# z4 ^$ s$ D) uBUT a few lines of script in a WSH script or in an ASP page allow to print/ b. K7 L5 ?! U- ~& p
these passwords in CLEAR TEXT.5 q5 k9 n" U1 ~' h" M! @
The user name and password used to connect to the Logs DSN could allow a, ^: Y! x/ ~$ Q; ]# Y
malicious user to delete traces of his activities on the server.
& X$ @% Q4 Y" Q& k' Z2 n" jObviously this represents a significant risk for Web servers that allow2 Q$ W& y- c# I' O& @# }+ {
logons and/or remote access, although I did not see any exploit of the
& y2 p3 I5 d3 R3 tproblem I am reporting yet. Here is an example of what can be gathered:
( E: e) U/ j2 V"0 h7 N+ o: l* |6 @( n
IIS 4.0 Metabase
" H; ?; p' d% x1 x/ t$ A5 |: t* j?Patrick Chambet 1998 - pchambet@club-internet.fr
9 ?2 v: Q) `9 I1 ^! r--- UNC User ---
4 Z% j |- l2 R5 rUNC User name: 'Lou'; l! Z! F) C0 C
UNC User password: 'Microsoft'
" P& g8 X) k* m' g: t" ZUNC Authentication Pass Through: 'False'3 ~: t s% x# ]' `8 W. m
--- Anonymous User ---' j. U# j# Q& q6 E8 d3 v
Anonymous User name: 'IUSR_SERVER': d: Q2 o8 b$ E: D6 w7 h E
Anonymous User password: 'x1fj5h_iopNNsp'
9 F# u. _; k0 g- z) OPassword synchronization: 'False'% M% d, a# C% p; S7 J! N
--- IIS Logs DSN User ---) m6 e0 R& @/ B" a% q" w/ ]
ODBC DSN name: 'HTTPLOG'
) ]$ E) j5 j; D/ l! |. Z+ x- T5 l5 _ODBC table name: 'InternetLog' p$ u3 @; E% j
ODBC User name: 'InternetAdmin'
H2 a M$ P/ f$ A2 LODBC User password: 'xxxxxx') Q" R7 p" i! J* X/ w
--- Web Applications User ---
. n# m! M1 |* x2 i& M* pWAM User name: 'IWAM_SERVER'
8 Y5 u% i/ J7 \1 s1 QWAM User password: 'Aj8_g2sAhjlk2'
: \" V5 f; A8 q! ] \5 W1 BDefault Logon Domain: '' _ u' }* q$ q3 r$ r# H
") p; L$ g v( U6 T6 q4 z4 v* V
For example, you can imagine the following scenario:
$ Z. \ e! Q( D/ z1 n$ UA user Bob is allowed to logon only on a server hosting IIS 4.0, say
* N/ X& P7 n% r* ^; q o7 ]* J7 [. bserver (a). He need not to be an Administrator. He can be for example6 @$ M" w) h8 U( V
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
' h2 ^+ t S2 Q$ l( R# Bthe login name and password of the account used to access to a virtual
- G4 p' X& F& O% mdirectory located on another server, say (b).
" W" `5 J6 s& V1 NNow, Bob can use these login name and passord to logon on server (b).: ?7 V- J% x, E( b5 j6 j6 U+ }
And so forth...: [0 i# T/ N1 a3 S: M5 R' E
Microsoft was informed of this vulnerability.
" P7 Y6 C5 c; j9 d; t_______________________________________________________________________$ j& A( a) e& c7 i' w
Patrick CHAMBET - pchambet@club-internet.fr$ k6 q* F, s t P8 Q* I8 ^
MCP NT 4.0( V) Z" }4 C7 o
Internet, Security and Microsoft solutions0 T' @0 h5 K6 p' q; y
e-business Services4 j; i+ f" X0 l( s3 G
IBM Global Services
: p5 [; W) a9 j) T/ x/ { |