GroundWork Monitor Enterprise Foundation Webapp Admin Interface Authentication Bypass

high Nessus Plugin ID 67019

Synopsis

The remote host has a web application that is affected by an authentication bypass vulnerability.

Description

The remote host has a version of GroundWork Monitor Enterprise installed that has a poorly protected administration application. By sending a specially crafted HTTP request, it is possible for a remote attacker to access the Foundation Webapp Admin Interface without logging in.

Note that installs affected by this vulnerability are most likely affected by other vulnerabilities as well.

Solution

See the vendor advisory for a workaround.

See Also

http://www.nessus.org/u?8bed79e0

http://www.nessus.org/u?6e52b021

Plugin Details

Severity: High

ID: 67019

File Name: groundwork_monitor_enterprise_auth_bypass.nasl

Version: 1.6

Type: remote

Family: CGI abuses

Published: 6/28/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:gwos:groundwork_monitor

Required KB Items: www/groundwork_monitor_enterprise

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 3/8/2013

Vulnerability Publication Date: 3/8/2013

Reference Information

CVE: CVE-2013-3499

BID: 58404

CERT: 345260