Valdis.Kletnieks@xxxxxx wrote: > On Tue, 27 Jul 2004 03:00:52 +0900, Chiaki <ishikawa@xxxxxxxxxxxx> said: > > Granted that many of these files under user home directories > > visible on the web > > must be the password to be used by anonymous server or > > publicly usable CVS server, but I doubt if ALL of them > > are the result of such benign neglect. > If a user's home directory is visible via a web browser, the .cvspass > is probably not the biggest problem.... It looks like quite some people check the .cvspass into cvs itself. When doing a quick check of yesterdays advisory, most hits were from cvs-viewing utilities. Maybe they just don't know what .cvspass is for and think "oh, there's a .cvs in there, I'd better check it in". Of course this doesn't explain why they move it into the respective directory in the first place, as it usually resides in $HOME, while CVS sources usually create their own directory on checkout. Also note, that for exploitation you do not even need to reverse the password. You just add the .cvspass entries to your own .cvspass and get access. Kind regards, Andreas Beck -- Andreas Beck http://www.bedatec.de/