exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

compulink-laserfiche-passwd.txt

compulink-laserfiche-passwd.txt
Posted Aug 17, 1999

compulink-laserfiche-passwd.txt

tags | exploit, code execution, file inclusion
SHA-256 | 1b44ecf0889a9539e6e280fe60889c0514c36042d731fccb05a1caa600f6aa76

compulink-laserfiche-passwd.txt

Change Mirror Download
Date: Thu, 28 Jan 1999 10:21:55 -0800
From: Darren Rogers <DROGERS@CI.SIMI-VALLEY.CA.US>
To: BUGTRAQ@netspace.org
Subject: Compulink LaserFiche Client/Server - unencrypted passwords

Background:
LaserFiche is a popular client-server imaging system, which
according to their website, 'is the trusted imaging system used by
Fortune 1000 corporations and government agencies around the world.
There are numerous law enforcement agencies using this software for
records sotrage and retreival.

Problem:
In the NetWare based version (4.1 and 4.2), the user list and
ACLs are stored in Btreive tables. Usernames, passwords, and group
membership information is stored completely unencrypted in these
tables, giving full access to anyone who can figure out how to open a
Btreive table. Administrative changes can also be made to these
tables without any logging, or control (normally an 'admin' user would
have to add and delte users and change access levels).
Big deal, it's client server, so clients don't need to have
access to those tables. True, but... this product's 'security' and
auditing abilites are often trusted by the court system to provide
proof as to who created, viewed, or deleted a record (records
management laws are very strict!). The legal ramifications are pretty
ugly (lowly net-admins being valled to testify in court, etc.)

Work-around:
All LaserFiche tables should be secured (being client-server,
users do NOT need to have any NetWare rights to the tables, or data
store) from all users except the responsible records manager. Use
NetWare's auditing feature in addition to the LF stuff to ensure that
no direct access is made to said tables.
At last contact, the company had no desire to fix this hole.

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close