BadBlue ISAPI Extension .hts Crafted File Extension Request Authentication Bypass

This script is Copyright (C) 2003-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by an authentication bypass
vulnerability.

Description :

The remote host is running the BadBlue web server earlier than 2.2.
Such versions are reportedly affected by an authentication bypass
vulnerability. It is possible for an attacker to gain administrative
access using a filename with a .ats extension instead of a .hts
extension.

See also :

http://seclists.org/vulnwatch/2003/q2/77

Solution :

Upgrade to BadBlue v 2.2 or newer as this reportedly fixes the issue.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.6
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 11554 (badblue_remote_administrative_access.nasl)

Bugtraq ID: 7387

CVE ID: CVE-2003-0332

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now