First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Hacker Puts Nasdaq on Warning
- — 03 October, 2000 15:44
He didn't, however. Instead he warned the administrators at Nasdaq.com, CBS.MarketWatch.com, BigCharts.com and FTMarketWatch.com. Now the security holes have been patched up, and the hacker is disclosing his discoveries.
Gerrie Mansur, one of the leaders of Dutch hacking group Hit2000, gained access to the global.asa file from the Web servers of the news sites. This file regulates who gets access to what application on the server. The file also defines what the applications can do and contains the global settings for the applications, as well as startup and shutdown routines. Nasdaq's global.asa file contains the password to the site's main database, said Mansur.
The news sites run on Internet Information Server (IIS) software from Microsoft.
"Mansur took advantage of known security holes," said Marco van Berkum, a security specialist at Dutch IT security company Obit. Van Berkum guessed that the hacker used a well known security hole called the Source Fragment Disclosure Vulnerability.
"Often the global.asa file will contain database passwords," said Van Berkum. "It looks like that was the case with Nasdaq."
Details of this particular vulnerability, or security hole, were published on the BugTraq mailing list on July 17. By adding "+.htr" to a request for a known .asa (or .asp, .ini, etcetera) file, Microsoft IIS 4.0 and 5.0 can be made to disclose fragments of source code which should otherwise be inaccessible. A description of the vulnerability can be found at http://www.securityfocus.com/bid/1488/.
Mansur, however, denied having used this way to hack into the servers.
"I did not use the Source Fragment Disclosure Vulnerability, but used an exploit I wrote myself," he said. The exploit is software tool that Mansur developed and then used to gain access to the servers.
"I will not publish the exploit," Mansur said.
"People will start using it, and that's just too dangerous. I was able to log in as service administrator and get full access to the server. I could even kick the administrator."
The hacker warned all the involved Webmasters by e-mail. Dan Schindler, director of Technical Client Service at CBSMarketWatch.com, responded, "Many thanks for bringing this to our attention. We have installed a patch and deployed it to all our data centres. We appreciate your honesty and willingness to send this notification to us," Schindler said in his e-mail.