IBM Rational Focal Point Default Credentials

high Nessus Plugin ID 72860

Synopsis

The remote host is running a web application that is using a known set of default credentials.

Description

Nessus was able to login to the remote IBM Rational Focal Point install using a default set of known credentials. A remote attacker using these credentials can gain administrative access to the web application.

Solution

Change the password for the 'admin' user.

Plugin Details

Severity: High

ID: 72860

File Name: ibm_rational_focalpoint_default_creds.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 3/6/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:ibm:rational_focal_point

Required KB Items: www/ibm_rational_focal_point

Excluded KB Items: global_settings/supplied_logins_only