BadBlue ISAPI Extension .hts Crafted File Extension Request Authentication Bypass

This script is Copyright (C) 2003-2011 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by an authentication bypass
vulnerability.

Description :

The remote host is running the BadBlue web server earlier than 2.2.
Such versions are reportedly affected by an authentication bypass
vulnerability. It is possible for an attacker to gain administrative
access using a filename with a .ats extension instead of a .hts
extension.

See also :

http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0075.html

Solution :

Upgrade to BadBlue v 2.2 or newer as this reportedly fixes the issue.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.6
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 11554 (badblue_remote_administrative_access.nasl)

Bugtraq ID: 7387

CVE ID: CVE-2003-0332

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial