A weakness has been reported in Microsoft Internet Explorer, which may expose FTP usernames and passwords.
When Internet Explorer is used to access an FTP site, the username and password is stored in the file (e.g. an HTML file) when viewing and then saving (using "File" -> "SaveAs") it. This may lead to exposure of the username and password if a user e.g. uploads the saved file or makes it otherwise accessible to other people.
The weakness is reported in Internet Explorer version 6 and 7 (when using the "Open FTP Site in Windows Explorer"). Other versions may also be affected.
Solution: Do not make files (e.g. HTML files) that were opened and then saved via an FTP session in Internet Explorer available to others.
Provided and/or discovered by: Reported in a news article.
Original Advisory: http://blog.washingtonpost.com/securityfix/2007/08/ftp_files_expose_web_site_cred.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Microsoft Internet Explorer FTP Credentials Exposure
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.