Vulnerabilities > CVE-2005-3280 - Remote Authentication Bypass vulnerability in Paros 3.2.5

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
paros
nessus

Summary

Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.

Vulnerable Configurations

Part Description Count
Application
Paros
1

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200601-15.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200601-15 (Paros: Default administrator password) Andrew Christensen discovered that in older versions of Paros the database component HSQLDB is installed with an empty password for the database administrator
last seen2020-06-01
modified2020-06-02
plugin id20823
published2006-01-30
reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20823
titleGLSA-200601-15 : Paros: Default administrator password