Bugtraq mailing list archives
FTPPro insecuities
From: the-wall () WIRETRIP NET (The Wall)
Date: Mon, 27 Dec 1999 10:27:41 -0600
FTPPro v.7.5 FTPPro stores credit card information in multiple locations, unprotected, and in plain text. The program consists of 2 files, FTPPro20.exe and FTPPro20.hlp. These files do not require their directory to be in the working %PATH% statement. When the program initializes for the first time, it creates a key in the registry: \HKEY_LOCAL_MACHINE\SOFTWARE\FTPPro98c This key is set with the following permissions: Administrator (Full Control) Creator Owner (Full Control) Everyone (Special Access - Query Value Set Value Create Subkey Enumerate Subkeys Notify Delete Read Control) System (Full Control) The primary purpose of this key is not to store any real program related information, but to store license and registration information. Among the keys and their data are: Credit Card # Credit Card Expiration Date Credit Card type (VISA, MC, etc.) Name, Address, City, State, Zip, Phone The program will not submit the registration information until all of the above information (and more) is provided. All of this information is stored in the registry unprotected. The only relevant program information stored under this key is the program version and the "LastRunDate". In addition to entering all of the above data into the registry, the program provides a "Register Offline" option. This option will create a text file called "Register.txt" in the program working directory containing all of the above information in clear text. Sabine Consulting, the program distributors, have been notified.
Current thread:
- Re: Announcement: Solaris loadable kernel module backdoor, (continued)
- Re: Announcement: Solaris loadable kernel module backdoor pedward () WEBCOM COM (Dec 21)
- Re: Announcement: Solaris loadable kernel module backdoor Marc Esipovich (Dec 22)
- Re: Announcement: Solaris loadable kernel module backdoor Steven Alexander (Dec 23)
- Re: Announcement: Solaris loadable kernel module backdoor Rainer Link (Dec 22)
- Re: Announcement: Solaris loadable kernel module backdoor Keith Owens (Dec 22)
- Re: Groupewise Web Interface satherrl () MAILPOINT DSSRG CURTIN EDU AU (Dec 21)
- Norton Email Protection Remote Overflow (Addendum) Matt Conover (Dec 20)
- procmail / Sendmail - five bugs Michal Zalewski (Dec 23)
- Re: procmail / Sendmail - five bugs Rob Jones (Dec 20)
- Re: procmail / Sendmail - five bugs Michal Zalewski (Dec 22)
- FTPPro insecuities The Wall (Dec 27)
- serious Lotus Domino HTTP denial of service Alain Thivillon (Dec 21)
- More details on the WU-FTPD configuration vulnerability. suid (Dec 21)
- Microsoft Security Bulletin (MS99-058) Aleph One (Dec 21)
- Microsoft Security Bulletin (MS99-061) Aleph One (Dec 21)
- More Netscape Passwords Available. Rob Jones (Dec 21)
- UnixWare i2odialogd remote root exploit Brock Tellier (Dec 21)
- IE 5.01 vulnerabilities in external.NavigateAndFind() Georgi Guninski (Dec 22)
- Solaris 2.7 dmispd local/remote problems Brock Tellier (Dec 22)
- Multiple vulnerabilites in glFtpD (current versions) suid (Dec 22)
- Re: Multiple vulnerabilites in glFtpD (current versions) Per Lejontand (Dec 23)