Beehive/SendFile.NET - Secure File Transfer Appliance Hardcoded Credentials Feb 29 2008 01:29AM
brad antoniewicz foundstone com
Title: Beehive/SendFile.NET - Secure File Transfer Appliance Hardcoded Credentials

Vendor: Beehive Software

Vendor URL: http://www.thebeehive.com/

Affected File: http://<host>/sfcommon/SendFile.jar

Vendor Contact Date: 7/26/2007

Vendor Response: None

Workaround:

The simplest way to protect against this attack is to block access to unnecessary services (e.g FTP) from the internet.

Description:

Within the outboxWriteUnsent() function of the FTPThread.class file of SendFile.jar the following lines reveal a hardcoded username and password which can be used to login to the FTP Server. Most servers disallow direct communication to the appliance from the internet however threats from the internal network still exist.

SendFile.jar:

------------<snip>------------

URL url1 = new URL(url.getProtocol() + "://" + url.getHost() +

"/s.ftp?command=putfile&user=sfoutbox&pass=sfoutbox&dir=" + mAcctID +

"/" + FTPStream.escapePathName(mUser) + "&createdir=1&file=" +

mOutboxTime + ".unsent.html");

------------</snip>------------

And

------------<snip>------------

ftpstream = new FTPStream(mApplet.getDocumentBase().getHost(),

"sfoutbox", "sfoutbox", true, false, mProgressWindow, false, mProxyIP,

mProxyPort, mProxyUser, mProxyPass);

------------</snip>------------

Credit:

Brad Antoniewicz

Email: Brad.Antoniewicz at foundstone.com

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus