Lucene search

K
nessusThis script is Copyright (C) 2006-2021 Tenable Network Security, Inc.SUN_DS_SERVER_CONSOLE_ACCESS.NASL
HistoryMay 26, 2006 - 12:00 a.m.

Sun Server Console Authentication Bypass

2006-05-2600:00:00
This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.
www.tenable.com
12

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.8%

The remote host is running the Sun ONE Server Console, which provides an administrative interface to the Sun Java System Directory Server installed there.

The Server Console instance on the remote host allows authentication using a default set of credentials - ‘admin’ / ‘admin’. This is likely the result not of a deliberate choice during installation but rather a flaw in the version of Directory Server used for the initial installation.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(21597);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2006-2513");
  script_bugtraq_id(18018);

  script_name(english:"Sun Server Console Authentication Bypass");
  script_summary(english:"Tries to authenticate to Server Console as admin/admin");

  script_set_attribute(attribute:"synopsis", value:"The remote web server is protected with a default set of credentials.");
  script_set_attribute(attribute:"description", value:
"The remote host is running the Sun ONE Server Console, which provides
an administrative interface to the Sun Java System Directory Server
installed there.

The Server Console instance on the remote host allows authentication
using a default set of credentials - 'admin' / 'admin'.  This is likely
the result not of a deliberate choice during installation but rather a
flaw in the version of Directory Server used for the initial
installation.");
  # http://web.archive.org/web/20070319094319/http://sunsolve.sun.com/search/document.do?assetkey=1-26-102345-1
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?115f5475");
  script_set_attribute(attribute:"solution", value:
"Manually change the administrative user password as described in the
vendor advisory referenced above.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/05/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2006/05/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/05/26");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("global_settings/supplied_logins_only");
  script_require_ports("Services/www", 390);

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (supplied_logins_only) audit(AUDIT_SUPPLIED_LOGINS_ONLY);

port = get_http_port(default:390);

# Make sure that it looks like the Server Console and that it's protected.
banner = get_http_banner(port:port);
if (!banner || "Netscape-Enterprise" >!< banner) exit(0, "The web server listening on port "+port+" does not look like Sun ONE.");

url = "/admin-serv/authenticate";
w = http_send_recv3(method:"GET", item:url, port:port, exit_on_fail:TRUE);
if ('WWW-authenticate: basic realm="Sun ONE Administration Server"' >!< w[1]) exit(0, "The Sun ONE Administration Server listening on port "+port+" does not require credentials.");


# Try to log in.
w = http_send_recv3(method:"GET", item:url, port:port, username: "admin", password: "admin", exit_on_fail:TRUE);

res = strcat(w[0], w[1], '\r\n', w[2]);

# There's a problem if we get in.
if ("UserDN: cn=admin-serv" >< res) security_hole(port);
else audit(AUDIT_LISTEN_NOT_VULN, "Sun ONE Administration Server", port);

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.8%

Related for SUN_DS_SERVER_CONSOLE_ACCESS.NASL