This script is Copyright (C) 2003-2015 Tenable Network Security, Inc.
The remote web server contains a Java Application that is affected by
a cleartext authentication vulnerability.
The remote host is running 12Planet Chat Server - a web-based chat
server written in Java.
The connection to this server is done via cleartext, which means that
an attacker who can sniff the data going to this host could obtain the
administrator password of the website, and use it to gain unauthorized
access to this chat server.
See also :
Add an HTTPS layer to the administration console for the deployment of
Risk factor :
Low / CVSS Base Score : 1.8
CVSS Temporal Score : 1.8
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 11591 (12planet_chat_server_plaintext_password.nasl)
Bugtraq ID: 7354
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.