WhatsUp Gold Default Admin Account vulnerability on the serve
Reporter | Title | Published | Views | Family All 66 |
---|---|---|---|---|
![]() | Unprotected PC Anywhere Service | 3 Nov 200500:00 | – | openvas |
![]() | AOLserver Default Password | 3 Nov 200500:00 | – | openvas |
![]() | Enhydra Multiserver Default Password | 3 Nov 200500:00 | – | openvas |
![]() | Allied Telesyn Router/Switch Web interface found with default password | 3 Nov 200500:00 | – | openvas |
![]() | Linksys Router Default Password | 3 Nov 200500:00 | – | openvas |
![]() | F5 Device Default Support Password | 3 Nov 200500:00 | – | openvas |
![]() | AirConnect Default Password | 3 Nov 200500:00 | – | openvas |
![]() | Shiva LanRover Blank Password | 3 Nov 200500:00 | – | openvas |
![]() | Cisco Device Default Password (Telnet) | 4 Nov 200700:00 | – | openvas |
![]() | Shiva Integrator Default Password (Telnet) | 3 Nov 200500:00 | – | openvas |
# OpenVAS Vulnerability Test
# $Id: DDI_WhatsUp_Default.nasl 8023 2017-12-07 08:36:26Z teissa $
# Description: WhatsUp Gold Default Admin Account
#
# Authors:
# H D Moore <[email protected]>
#
# Copyright:
# Copyright (C) 2001 H D Moore <[email protected]>
# Copyright (C) 2001 Digital Defense Inc.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
tag_summary = "This WhatsUp Gold server still has the default password for
the admin user account. An attacker can use this account to
probe other systems on the network and obtain sensitive
information about the monitored systems.";
tag_solution = "Login to this system and either disable the admin
account or assign it a difficult to guess password.";
if(description)
{
script_id(11004);
script_version("$Revision: 8023 $");
script_tag(name:"last_modification", value:"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-1999-0508");
name = "WhatsUp Gold Default Admin Account";
script_name(name);
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"remote_vul");
script_copyright("This script is Copyright (C) 2001 Digital Defense Inc.");
family = "General";
script_family(family);
script_dependencies("find_service.nasl");
script_require_ports("Services/www", 80);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
exit(0);
}
#
# The script code starts here
#
include("http_func.inc");
port = get_http_port(default:80);
if(get_port_state(port))
{
soc = http_open_socket(port);
if (soc)
{
req = string("GET / HTTP/1.0\r\nAuthorization: Basic YWRtaW46YWRtaW4K\r\n\r\n");
send(socket:soc, data:req);
buf = http_recv(socket:soc);
http_close_socket(soc);
if ("Whatsup Gold" >< buf && "Unauthorized User" >!< buf)
{
security_message(port:port);
}
}
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo