Vulnerability CVE-2010-0219


Published: 2010-10-18   Modified: 2012-02-13

Description:
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.

See advisories in our WLB2 database:
Topic
Author
Date
High
SAP BusinessObjects Axis2 Default Admin Password
HD Moore (HD_Moo...
18.10.2010

Type:

CWE-255

(Credentials Management)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
SAP -> Businessobjects 
Apache -> Axis2 

 References:
http://retrogod.altervista.org/9sg_ca_d2d.html
http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
http://www.exploit-db.com/exploits/15869
http://www.kb.cert.org/vuls/id/989719
http://www.rapid7.com/security-center/advisories/R7-0037.jsp
http://www.securityfocus.com/archive/1/514284/100/0/threaded
http://www.securitytracker.com/id?1024929
http://www.vupen.com/english/advisories/2010/2673
https://exchange.xforce.ibmcloud.com/vulnerabilities/62523
https://kb.juniper.net/KB27373
https://service.sap.com/sap/support/notes/1432881

Copyright 2020, cxsecurity.com

 

Back to Top