Trapeze Service Shell - Admin Service Accessible

high Nessus Plugin ID 42210
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The administrative console for the remote web server has not been secured.


The remote web server is a Trapeze Service Shell, the application server component included with various products from Trapeze Software, Inc., such as their traveller information systems for providing public bus and train route information.

The remote Trapeze Service Shell has not been securely configured as it allows uncredentialed access the Admin Service, one of the web services it provides.

A remote attacker can leverage this issue to discover sensitive information about the remote installation of Trapeze or load / unload Trapeze plugins available on the affected system

Note that there are likely to be other services available through the affected application that also have not been secured; services which could expose the application's database or the host's files, although Nessus has not checked for them.


Apply the proper Security Settings for the Trapeze Service Shell as discussed in the product's Setup Guide.

Plugin Details

Severity: High

ID: 42210

File Name: trapeze_admin_accessible.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 10/22/2009

Updated: 1/19/2021

Dependencies: http_version.nasl

Risk Information


Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploited by Nessus: true