Lyris ListManager MSDE Weak sa Password

medium Nessus Plugin ID 20728

Synopsis

The remote database server uses a weak password for one of its administrative accounts.

Description

The remote host appears to be running ListManager, a web-based commercial mailing list management application from Lyris.

The version of ListManager on the remote host was installed using Microsoft SQL Server Desktop Engine (MSDE) for its database backend along with a weak password for the 'sa' account - 'lyris' followed by up to 5 digits. An attacker may be able to discover this password by means of a brute-force attack and gain administrative access to the database.

Solution

Assign a strong 'sa' password to MSDE and update the setting for '$sql_password' in ListManager's 'lmcfg.txt' file.

See Also

http://www.nessus.org/u?e252a917

https://seclists.org/fulldisclosure/2005/Dec/374

Plugin Details

Severity: Medium

ID: 20728

File Name: listmanager_msde_weak_sa_password.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 1/16/2006

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Required KB Items: SMB/name, SMB/login, SMB/password, SMB/registry_full_access, SMB/transport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 12/8/2005

Exploitable With

Metasploit (Lyris ListManager MSDE Weak sa Password)

Reference Information

CVE: CVE-2005-4145