Lucene search

K

WhatsUp Gold Default Admin Account

🗓️ 03 Nov 2005 00:00:00Reported by This script is Copyright (C) 2001 Digital Defense Inc.Type 
openvas
 openvas
🔗 plugins.openvas.org👁 39 Views

WhatsUp Gold Default Admin Account vulnerability on the serve

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Code
ReporterTitlePublishedViews
Family
OpenVAS
Unprotected PC Anywhere Service
3 Nov 200500:00
openvas
OpenVAS
AOLserver Default Password
3 Nov 200500:00
openvas
OpenVAS
Enhydra Multiserver Default Password
3 Nov 200500:00
openvas
OpenVAS
Allied Telesyn Router/Switch Web interface found with default password
3 Nov 200500:00
openvas
OpenVAS
Linksys Router Default Password
3 Nov 200500:00
openvas
OpenVAS
F5 Device Default Support Password
3 Nov 200500:00
openvas
OpenVAS
AirConnect Default Password
3 Nov 200500:00
openvas
OpenVAS
Shiva LanRover Blank Password
3 Nov 200500:00
openvas
OpenVAS
Cisco Device Default Password (Telnet)
4 Nov 200700:00
openvas
OpenVAS
Shiva Integrator Default Password (Telnet)
3 Nov 200500:00
openvas
Rows per page
# OpenVAS Vulnerability Test
# $Id: DDI_WhatsUp_Default.nasl 8023 2017-12-07 08:36:26Z teissa $
# Description: WhatsUp Gold Default Admin Account
#
# Authors:
# H D Moore <[email protected]>
#
# Copyright:
# Copyright (C) 2001 H D Moore <[email protected]>
# Copyright (C) 2001 Digital Defense Inc.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "This WhatsUp Gold server still has the default password for
the admin user account. An attacker can use this account to
probe other systems on the network and obtain sensitive 
information about the monitored systems.";

tag_solution = "Login to this system and either disable the admin
account or assign it a difficult to guess password.";

if(description)
{
 script_id(11004);
 script_version("$Revision: 8023 $");
 script_tag(name:"last_modification", value:"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $");
 script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 script_tag(name:"cvss_base", value:"4.6");
 script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
 script_cve_id("CVE-1999-0508");
 name = "WhatsUp Gold Default Admin Account";
 script_name(name);


 script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"remote_vul");

 script_copyright("This script is Copyright (C) 2001 Digital Defense Inc.");
 family = "General";
 script_family(family);

 script_dependencies("find_service.nasl");
 script_require_ports("Services/www", 80);
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 exit(0);
}

#
# The script code starts here
#

include("http_func.inc");

port = get_http_port(default:80);


if(get_port_state(port))
 {
  soc = http_open_socket(port);
  if (soc)
  {
    req = string("GET / HTTP/1.0\r\nAuthorization: Basic YWRtaW46YWRtaW4K\r\n\r\n");
    send(socket:soc, data:req);
    buf = http_recv(socket:soc);
    http_close_socket(soc);
    if ("Whatsup Gold" >< buf && "Unauthorized User" >!< buf)
    {
     security_message(port:port);
    }
  }
 }

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Nov 2005 00:00Current
0.7Low risk
Vulners AI Score0.7
EPSS0.46253
39
.json
Report