Sun Server Console Authentication Bypass

high Nessus Plugin ID 21597
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote web server is protected with a default set of credentials.

Description

The remote host is running the Sun ONE Server Console, which provides an administrative interface to the Sun Java System Directory Server installed there.

The Server Console instance on the remote host allows authentication using a default set of credentials - 'admin' / 'admin'. This is likely the result not of a deliberate choice during installation but rather a flaw in the version of Directory Server used for the initial installation.

Solution

Manually change the administrative user password as described in the vendor advisory referenced above.

See Also

http://www.nessus.org/u?115f5475

Plugin Details

Severity: High

ID: 21597

File Name: sun_ds_server_console_access.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 5/26/2006

Updated: 1/19/2021

Dependencies: http_version.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Ease: No exploit is required

Patch Publication Date: 5/16/2006

Vulnerability Publication Date: 5/16/2006

Reference Information

CVE: CVE-2006-2513

BID: 18018