Information Security News mailing list archives
FTC, FBI sites leave opening for hacker access
From: William Knowles <wk () C4I ORG>
Date: Mon, 11 Dec 2000 01:15:40 -0600
http://www.infoworld.com/articles/hn/xml/00/12/08/001208hnfbiftc.xml?p=br&s=9 By James Evans and Joris Evers Friday, Dec. 8, 2000 2:50 pm PT A EUROPEAN INFORMATION security specialist says that he discovered a potential security hazard in two U.S. government Web sites that use Netscape Communications Enterprise Server, including the online home of the U.S. Federal Bureau of Investigation (FBI). The specialist, once a hacker and now a member of HIT2000 Information Security, discovered a Web page that offers potential access to the U.S. Federal Trade Commission (FTC) Web site: www.ftc.gov. The IDG News Service later learned that a similar page exists on the FBI Web site: www.fbi.gov. Although it is not exactly clear what can be accessed from the apparent holes, the ex-hacker discovered he was able to access the FBI's Web site manager directory, showing a full directory listing of the FBI Web server. Security experts suggest any hint of a vulnerability can make the sites a target for hackers. "The less you give out to the public, the better," said Richard Smith, an Internet security consultant based in Brookline, Mass. "You really don't want these pages to be visible outside the organization. You really want to hide this stuff so people won't have any idea of where to poke. It should be obscured. It should be internal." Both the FTC and FBI run Netscape Enterprise Server software. The Web sites offer access to the server's Publisher program, which when enabled gives authorized users access to make alterations to Web sites. According to the European specialist, who asked not to be identified, Publisher allows anyone on the Web to look at certain internal logs and directories on the server, even when it is disabled. "Netscape Publisher is meant for Web site administrators to manage the site," he said in an e-mail interview. "Log-in name is 'admin' and typically there is no administrator password. You can use it to browse through the site and might stumble upon log files. These files sometimes contain password data or, in the case of an e-commerce site, transaction records," he said. "Besides that, many database files and backups are usually saved in a directory on the server that is normally not accessible via the Web," the ex-hacker said. "These databases can contain privacy sensitive information that is now available for download through Publisher." Netscape did not respond to inquiries. A senior computer specialist at the FTC, however, said there was no vulnerability and nothing was enabled on the Netscape Publisher page. "It is disabled and has never been enabled," said Mike Frank at the FTC. "It is part of Netscape Enterprise Server." He added that the FTC runs Version 3.62. Nothing is really available, except access to the online manual for Publisher, Frank said. "It just runs into a hole for me and tries to start a Java tool editor," Frank said. But the Java applet did load in other instances known to the IDG News Service. The Publisher tool has never been enabled and FTC network administrators never saw the page as a threat to security, Frank said. The pages were, however, removed after the IDG News Service contacted the FTC. FBI.gov may be more vulnerable, though, according to the European specialist. The site has an additional vulnerability that is not that old and most people are unaware of it, the ex-hacker said. This would allow a hacker to get full access to the FBI Web server. "It is specific to the combination of Netscape Enterprise Server 3.5.1 on [Sun Microsystems] Solaris," the ex-hacker said. "I could write an exploit within 10 minutes to get full access." The vulnerability is known to experts as a password buffer overrun. FBI spokeswoman Debbie Weierman said the agency had no comment. Regardless of whether one can actually gain access to the sites, a security expert with Global Integrity suggests that even giving hackers the perception of an opening is not wise. "Even if they can't [alter the site], it is inviting hacker traffic to the site, especially to the FBI," said Mark Rasch, vice president of cyber law for Global Integrity. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- FTC, FBI sites leave opening for hacker access William Knowles (Dec 11)
- <Possible follow-ups>
- Re: FTC, FBI sites leave opening for hacker access Kitetoa (Dec 12)