VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-0219
axis2, businessobjects: Apache Axis2, as used in dswsbobje.war in SAP Busin...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0219

Original

Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2 and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-10-18
Source Information Category:
Advisory, Alert
Last Updated:
2010-10-18




Affected Product Tags
cpe:/a:apache:axis2:1.3
cpe:/a:apache:axis2:1.4
cpe:/a:apache:axis2:1.4.1
cpe:/a:apache:axis2:1.5
cpe:/a:apache:axis2:1.5.1
cpe:/a:apache:axis2:1.5.2
cpe:/a:apache:axis2:1.6
cpe:/a:sap:businessobjects:3.2::enterprise_xi
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
VU#989719




BUGTRAQ 20101014 R7-0037: SAP BusinessObjects Axis2 Default Admin Password




MISC https://service.sap.com/sap/support/notes/1432881




MISC http://www.rapid7.com/security-center/advisories/R7-0037.jsp




MISC http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf




SECUNIA 41799




VUPEN ADV-2010-2673




Vulnerability Type Credentials Management (CWE-255)




XF businessobjects-dswsbobje-security-bypass(62523)





Copyright © 2010 JPCERT/CC All Rights Reserved.