CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
According to its self-reported version number, the EMC Data Protection Advisor running on the remote host is 6.3.x prior to 6.3 patch 159 or 6.4.x prior to 6.4 patch 110. It is, therefore, affected by a default credential vulnerability due to hardcoded password with the appolosuperuser database account. A local attacker with knowledge of the default password could potentially gain unauthorized access to the database.
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (description)
{
script_id(108405);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/05");
script_cve_id("CVE-2018-1206");
script_bugtraq_id(103376);
script_name(english:"EMC Data Protection Advisor < 6.4.110 Database Hardcoded Password Vulnerability");
script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a hardcoded credential vulnerability.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the EMC Data
Protection Advisor running on the remote host is 6.3.x prior to 6.3
patch 159 or 6.4.x prior to 6.4 patch 110. It is, therefore, affected
by a default credential vulnerability due to hardcoded password with
the appolosuperuser database account. A local attacker with knowledge
of the default password could potentially gain unauthorized access to
the database.");
script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2018/Mar/22");
script_set_attribute(attribute:"solution", value:
"Upgrade to EMC Data Protection Advisor version 6.3 patch 159 /
6.4 patch 110, or later.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-1206");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/03/07");
script_set_attribute(attribute:"patch_publication_date", value:"2018/03/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/16");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:emc:data_protection_advisor");
script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("emc_dpa_web_detect.nasl");
script_require_keys("installed_sw/emc_dpa");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80, 443, 9002);
exit(0);
}
include("vcf.inc");
include("http.inc");
app = "emc_dpa";
get_install_count(app_name:app, exit_if_zero:TRUE);
port = get_http_port(default:9002);
app_info = vcf::get_app_info(app:app, port:port, webapp:TRUE);
constraints = [
{ "min_version" : "6.3", "fixed_version" : "6.3.159" },
{ "min_version" : "6.4", "fixed_version" : "6.4.110" },
];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE
);
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%