Sybase EAServer WebConsole jaqadmin Default Password

high Nessus Plugin ID 19218

Synopsis

The remote service is configured with a default administrator password.

Description

This host appears to be the running the Sybase EAServer Management with the default administrator accounts still configured (jagadmin/''). A potential intruder could reconfigure this service in a way that grants system access.

Solution

Change default administrator password.

See Also

https://seclists.org/bugtraq/2005/Jul/245

Plugin Details

Severity: High

ID: 19218

File Name: sybase_easerver_default_password.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 7/18/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning, global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/15/2005

Exploitable With

Metasploit (Sybase EAServer 5.2 Remote Stack Buffer Overflow)

Reference Information

BID: 14287