WebSpeed Messenger Administration Utility Unauthenticated Access

high Nessus Plugin ID 10304

Synopsis

The remote web server contains an application that is prone to privilege escalation attacks.

Description

The remote web server appears to be using Webspeed, a website creation language used with database-driven websites.

The version of Webspeed installed on the remote host allows anonymous access to the 'WSMadmin' utility, which is used configure Webspeed. An attacker can exploit this issue to gain control of the affected application.

Solution

Edit the 'ubroker.properties' file and change 'AllowMsngrCmds=1' to 'AllowMsngrCmds=0'.

See Also

https://seclists.org/bugtraq/2000/Feb/94

Plugin Details

Severity: High

ID: 10304

File Name: webspeed.nasl

Version: 1.34

Type: remote

Family: CGI abuses

Published: 2/5/2000

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/2/2000

Reference Information

CVE: CVE-2000-0127

BID: 969