Synopsis
The administration console for the remote web server is protected with default credentials.
Description
The remote host appears to be running Geronimo, an open source J2EE server from the Apache Software Foundation.
The installation of Geronimo on the remote host uses the default username and password to control access to its administrative console. Knowing these, an attacker can gain control of the affected application.
Solution
Alter the credentials in 'var/security/users.properties' or when deploying Geronimo.
Plugin Details
File Name: geronimo_console_default_creds.nasl
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:apache:geronimo
Excluded KB Items: global_settings/supplied_logins_only