Exploit Hancom Office 2007 - 'Reboot.ini' Clear-Text Passwords

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19192
Проверка EDB
  1. Пройдено
Автор
RUSS COOPER
Тип уязвимости
LOCAL
Платформа
WINDOWS
CVE
cve-1999-0372
Дата публикации
1999-02-09
Код:
source: https://www.securityfocus.com/bid/228/info

During installation of BackOffice 4.0, a file called reboot.ini is created and stored in the \Program Files\Microsoft BackOffice directory. This file contains clear-text usernames and passwords for several services that may be created during installation. These services include: SQL Executive Logon, Exchange Services, and MTS Remote Administration (and potentially others). The File ACLs for this file are set to Everyone:Full Control. 

Clear-text usernames and passwords are stored in the \Program Files\Microsoft BackOffice\Reboot.ini file.
 
Источник
www.exploit-db.com

Похожие темы