Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (File Transfer/Sharing)  >   File Transfer Anywhere Vendors:   TTXN
File Transfer Anywhere Stores Server Passwords in Plain Text
SecurityTracker Alert ID:  1014919
SecurityTracker URL:
CVE Reference:   CVE-2005-3036   (Links to External Site)
Updated:  Jun 8 2008
Original Entry Date:  Sep 16 2005
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 3.01
Description:   A vulnerability was reported in File Transfer Anywhere. A local user can view server passwords.

The software stores the server password in the registry (\HKEY_LOCAL_MACHINE\SOFTWARE\TTXN\File Transfer Anywhere). A local user can view the registry to obtain the server password.

Passwords sent from the client to the server are not encrypted for transmission.

Jonathan Read of Airscanner Mobile Security discovered this vulnerability.

Impact:   A local user can view the server password.
Solution:   The vendor has issued a fix.
Cause:   Access control error
Underlying OS:  Windows (CE)

Message History:   None.

 Source Message Contents

Date:  13 Sep 2005 23:31:18 -0000
Subject:  Airscanner Mobile Security Advisory #05082201: File Transfer

Airscanner Mobile Security Advisory #05082201:
File Transfer Anywhere v3.01 Local Server Password Disclosure

TTXN File Transfer Anywhere v3.01 server

Tested on Windows Mobile Pocket PC 2003

Mobile device running Windows Mobile Pocket PC with Transfer Anywhere v3.01 installed

Jonathan Read, CISSP
Airscanner Mobile Security
Mobile Antivirus Researchers Association
August 22 2005

Risk Level:
Medium, a local attacker can view server passwords in plain text.

File Transfer Anywhere is a http based file transfer application. It allows users to transfer files in a FTP server like way but using
 HTTP. The program can also be used as a webserver.
The author’s website is unknown but the software can be found on

File Transfer Anywhere has a couple of security issues. The first issue is the failure to encrypt passwords being sent via the client
 to the server. Passwords are sent in plaintext and can easily be sniffed through the air using a wireless packet sniffer (when the
 connection between the server and client are wireless).

The second issue is of greater concern. The server by default is not password protected (which is a security risk in itself), but
 most people will add a password and tick the save password box to avoid intrusions from unknown clients. Although the program uses
 **** symbols to hide the password in the programs GUI, it stores the saved password in the local registry in plain text. The password
 can easily be located using a registry editor tool at the following registry location:


Under this key a value called PASS will have the password as its data. This data should be encrypted as it gives a local attacker
 information that could allow them to gain full remote control of the device at a later stage.


Vendor Response
The vendor was notified and has released a new version that fixes this issue

Copyright (c) 2005 Airscanner Corp.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written
 consent of Airscanner Corp. If you wish to reprint the whole or any part of this alert in any other medium other than electronically,
 please contact Airscanner Corp. for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information.
 Use of the information constitutes acceptance for use on an AS IS condition. There are no warranties with regard to this information.
 Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from
 use of, or reliance on, this information.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC