Default admin account vulnerability in WhatsUp Gold serve
Reporter | Title | Published | Views | Family All 69 |
---|---|---|---|---|
![]() | Allied Telesyn Router/Switch Default Credentials (Telnet) | 3 Nov 200500:00 | – | openvas |
![]() | Shiva Integrator Default Password (Telnet) | 3 Nov 200500:00 | – | openvas |
![]() | Cisco Device Default Password (Telnet) | 4 Nov 200700:00 | – | openvas |
![]() | Bay Networks Accelar 1200 Switch Default Credentials (Telnet) | 3 Nov 200500:00 | – | openvas |
![]() | Cisco Device Default Password (SSH) | 4 Nov 200700:00 | – | openvas |
![]() | AirConnect Default Password (HTTP) | 3 Nov 200500:00 | – | openvas |
![]() | Enhydra Multiserver Default Password (HTTP) | 3 Nov 200500:00 | – | openvas |
![]() | Sun JavaServer Default Admin Password (HTTP) | 3 Nov 200500:00 | – | openvas |
![]() | Cisco Default Telnet Login | 11 Oct 201300:00 | – | openvas |
![]() | Apache Tomcat Default Account (HTTP) | 3 Nov 200500:00 | – | openvas |
# SPDX-FileCopyrightText: 2001 HD Moore / Digital Defense Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.11004");
script_version("2023-07-07T05:05:26+0000");
script_tag(name:"last_modification", value:"2023-07-07 05:05:26 +0000 (Fri, 07 Jul 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-1999-0507", "CVE-1999-0508");
script_name("WhatsUp Gold Default Admin Account (HTTP)");
script_category(ACT_ATTACK);
script_copyright("Copyright (C) 2001 HD Moore / Digital Defense Inc.");
script_family("Default Accounts");
script_dependencies("find_service.nasl", "httpver.nasl", "gb_default_credentials_options.nasl", "global_settings.nasl");
script_require_ports("Services/www", 80);
script_exclude_keys("Settings/disable_cgi_scanning", "default_credentials/disable_default_account_checks");
script_tag(name:"solution", value:"Login to this system and either disable the admin
account or assign it a difficult to guess password.");
script_tag(name:"summary", value:"This WhatsUp Gold server still has the default password for
the admin user account. An attacker can use this account to probe other systems on the network
and obtain sensitive information about the monitored systems.");
script_tag(name:"qod_type", value:"remote_vul");
script_tag(name:"solution_type", value:"Mitigation");
exit(0);
}
if(get_kb_item("default_credentials/disable_default_account_checks"))
exit(0);
include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
port = http_get_port(default:80);
buf = http_get_cache( item:"/", port:port );
if(! buf || buf !~ "^HTTP/1\.[01] 401" )
exit(0);
req = string("GET / HTTP/1.0\r\nAuthorization: Basic YWRtaW46YWRtaW4K\r\n\r\n");
res = http_send_recv(port:port, data:req);
if("Whatsup Gold" >< buf && "Unauthorized User" >!< buf) {
security_message(port:port);
exit(0);
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo