Short Name |
HTTP:CGI:QUIKSTORE-CFG-ACCESS |
---|---|
Severity |
Warning |
Recommended |
No |
Category |
HTTP |
Keywords |
QuikStore Config Access |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects access to quikstore.cfg, the QuikStore configuration file that is installed as world-readable. This file is a common target of vulnerability scans. Attackers can use this file to get the administrator password.
QuikStore is a commercial store front program providing order management, inventory, and other e-commerce related functions to web sites. It is written in perl, and stores configuration information in a separate configuration file for easy setup. Certain older versions of QuikStore stored the administrator name and password in plaintext in this configuration file, named "quikstore.cfg" in these versions. An unsecured default installation leaves this file world-readable, giving remote intruders access to it through the web server. With access to this file and the user/password combination contained in it, the intruder has full administrative access to the online store. Consequences of an attack could include modification of orders, product information, prices, and gathering of customer credit card information. At the time of writing, the specific affected versions were not known, although versions 2.10.05 and 2.11 are not vulnerable. Any installation storing the administrator name and password in a world readable configuration file is vulnerable. Although this can be fixed by properly configuring file permissions, storing password and account information in plain text is generally a poor approach.