Sun Server Console Authentication Bypass

high Nessus Plugin ID 21597
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote web server is protected with a default set of credentials.


The remote host is running the Sun ONE Server Console, which provides an administrative interface to the Sun Java System Directory Server installed there.

The Server Console instance on the remote host allows authentication using a default set of credentials - 'admin' / 'admin'. This is likely the result not of a deliberate choice during installation but rather a flaw in the version of Directory Server used for the initial installation.


Manually change the administrative user password as described in the vendor advisory referenced above.

See Also

Plugin Details

Severity: High

ID: 21597

File Name: sun_ds_server_console_access.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 5/26/2006

Updated: 1/19/2021

Dependencies: http_version.nasl

Risk Information


Risk Factor: Medium

Score: 5.8


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Ease: No exploit is required

Patch Publication Date: 5/16/2006

Vulnerability Publication Date: 5/16/2006

Reference Information

CVE: CVE-2006-2513

BID: 18018