what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ap-pwn.txt

ap-pwn.txt
Posted May 10, 2007
Authored by gobbles_fo_evar

The AP Newspower software installs with a MySQL instance that has a blank root password, allowing for remote attackers to manipulate the news.

tags | advisory, remote, root
SHA-256 | 144c6b63952b1f12725c1e1545c227016bd7406767f9ebe534c45c7d13b1e817

ap-pwn.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

AP Newspower is commercial software available from the AP that
allows media outlets to obtain text news feeds from the Associated
Press. It's like RSS, but you pay for it. And it's slower. And
fatter.

The default install of this software includes a MySQL instance
which stores the feeds as well as copy created by the local media
outlet. This MySQL database is configured to allow remote access
as root with a blank password. A person so inclined upon finding
such a box could, say, insert an article of their own into
shows.tblscript and make their own news. Or remotely censor the
news, or, ... Oh noes!

The AP has been alerted of this issue, and has said they are not
interested in fixing it.

- -----

I wonder if they bought a MySQL license, or if they are using it
under the GPL license. Their web page
(https://www.apbroadcast.com/AP+Broadcast/Radio/Prep+Services/AP+News
Power.htm) certainly makes no mention of where to obtain the
source.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.5

wpwEAQECAAYFAkZAk5YACgkQXsHJpAi2fRe4yQQAi6fDHuQRX0K8IW3Q4Th02D+EBxRM
JFGigWB7d6YsOkrwb2zCqpRwDKImoh/Y8OMZGVIoH4uwCAAYJzrRTPZh2I4xnrRFjtip
2kudDllCrlKor4XYuk9WOtJEOcHojZaczwOuNkLL2RsFE7uyTL8kAD3PiTsbxaPCVdZL
k3DZEb4=
=dVFH
-----END PGP SIGNATURE-----

--
Click here to refinance your mortgage. Low rates, approval in minutes.
https://tagline.hushmail.com/fc/CAaCXv1QYGKA65kmHH2830bl8uE0ZUIN/


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close