How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
An account on the remote host uses a default password.
The account 'product' or 'emailswitch' is using a default password. A
remote, unauthenticated attacker could exploit this to log in as an
unprivileged user. After logging in, an attacker can log into the local
MySQL server as root without a password. Additionally, getting access
to a root shell is trivial.
It is also likely that this host allows remote logins using the 'root',
'cluster', and 'remote' accounts using public key authentication, but
Nessus has not checked for those issues.
See also :
Upgrade to Security Definition 2.0.5 or later.
Note that this fix does not disable access to the root, cluster, or
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 64258 ()
Bugtraq ID: 57537
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.