10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
The SAP BusinessObjects product which deploys Axis2 is vulnerable to arbitrary code execution. It is possible because it uses a default password for the administrator account, allowing anyone with access to the Axis2 port to gain full access to the machine and execute an arbitrary code. Note: Apache Axis2 is not affected by itself but only when it is used in conjunction with the product mentioned.
retrogod.altervista.org/9sg_ca_d2d.html
secunia.com/advisories/41799
secunia.com/advisories/42763
spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
www.exploit-db.com/exploits/15869
www.kb.cert.org/vuls/id/989719
www.osvdb.org/70233
www.rapid7.com/security-center/advisories/R7-0037.jsp
www.securityfocus.com/archive/1/514284/100/0/threaded
www.securitytracker.com/id?1024929
www.vupen.com/english/advisories/2010/2673
exchange.xforce.ibmcloud.com/vulnerabilities/62523
kb.juniper.net/KB27373
service.sap.com/sap/support/notes/1432881