exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

infradig_1225_5-3-00.txt

infradig_1225_5-3-00.txt
Posted Mar 6, 2000
Authored by nemesystm | Site dhc1.cjb.net

Infradig 1.225 for Windows remote security hole - The administration server on port 81 allows anyone to edit accounts, add users, and set all kinds of things.

tags | exploit, remote
systems | windows
SHA-256 | 63f8d1a39cf329ce55fcd9216ecb9c6dcd197c0064764171dd3bb72347ab77a0

infradig_1225_5-3-00.txt

Change Mirror Download
+++>===] Written by Nemesystm, leader of the DHC [===<+++
++++>==] Visit us at dhc1.cjb.net You want 2 [==<++++

Subject: Infradig 1.225 Security Hole
Description program: Infradig is a HTTP Server with a Mail daemon, etc.
Description hole: There are no restrictions on the online administration bit of the server software.

<-[what was used]->
Infradig 1.225 for Windows 95/98 downloaded from cnet.com
Installed with the typical installation, no standard settings changed.
This problem worked on: Windows 98 + IE5.0

<-[how to create the problem]->
The administration service runs on port 81 (as adefault, can be set). Connecting to: http://www.server.com:81/sysadmin/sysadmin.cgi will let you edit accounts, add users, set all kinds of things like ports, and start services. (FTP, etc)
On the HTTP server, you can go to http://www.server.com/sysadmin/ and it will/should automatically refer you to the administration service.

<-[logs]->
when you go to the administration page, your IP is logged. you can find the logs in programdir\logs.
It also has what you do, and what browser you used.

<-[fix]->
Delete: program dir\inetpub\sysadmin\*.*
program dir\inetpub\mailadmin\*.*
Change all user things, etc, by rightclicking the server icon in the bottom right corner of the screen and choosing "Manual configure"

Greetz,
nemesystm, leader of the DHC (dhc1.cjb.net)

>>>The End<<<
auto45040@hushmail.com for questions.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close