Vulnerabilities > CVE-2006-2513 - Authentication Bypass vulnerability in SUN Java System Directory Server 5.2

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
sun
nessus

Summary

Unspecified vulnerability in the installation process in Sun Java System Directory Server 5.2 causes wrong user data to be written to a file created by the installation, which allows remote attackers or local users to gain privileges.

Vulnerable Configurations

Part Description Count
Application
Sun
5

Nessus

NASL familyCGI abuses
NASL idSUN_DS_SERVER_CONSOLE_ACCESS.NASL
descriptionThe remote host is running the Sun ONE Server Console, which provides an administrative interface to the Sun Java System Directory Server installed there. The Server Console instance on the remote host allows authentication using a default set of credentials -
last seen2020-06-01
modified2020-06-02
plugin id21597
published2006-05-26
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21597
titleSun Server Console Authentication Bypass
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(21597);
  script_version("1.15");
  script_cvs_date("Date: 2018/07/30 15:31:31");

  script_cve_id("CVE-2006-2513");
  script_bugtraq_id(18018);

  script_name(english:"Sun Server Console Authentication Bypass");
  script_summary(english:"Tries to authenticate to Server Console as admin/admin");

  script_set_attribute(attribute:"synopsis", value:"The remote web server is protected with a default set of credentials.");
  script_set_attribute(attribute:"description", value:
"The remote host is running the Sun ONE Server Console, which provides
an administrative interface to the Sun Java System Directory Server
installed there.

The Server Console instance on the remote host allows authentication
using a default set of credentials - 'admin' / 'admin'.  This is likely
the result not of a deliberate choice during installation but rather a
flaw in the version of Directory Server used for the initial
installation.");
  # http://web.archive.org/web/20070319094319/http://sunsolve.sun.com/search/document.do?assetkey=1-26-102345-1
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?115f5475");
  script_set_attribute(attribute:"solution", value:
"Manually change the administrative user password as described in the
vendor advisory referenced above.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/05/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2006/05/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/05/26");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("global_settings/supplied_logins_only");
  script_require_ports("Services/www", 390);

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (supplied_logins_only) audit(AUDIT_SUPPLIED_LOGINS_ONLY);

port = get_http_port(default:390);

# Make sure that it looks like the Server Console and that it's protected.
banner = get_http_banner(port:port);
if (!banner || "Netscape-Enterprise" >!< banner) exit(0, "The web server listening on port "+port+" does not look like Sun ONE.");

url = "/admin-serv/authenticate";
w = http_send_recv3(method:"GET", item:url, port:port, exit_on_fail:TRUE);
if ('WWW-authenticate: basic realm="Sun ONE Administration Server"' >!< w[1]) exit(0, "The Sun ONE Administration Server listening on port "+port+" does not require credentials.");


# Try to log in.
w = http_send_recv3(method:"GET", item:url, port:port, username: "admin", password: "admin", exit_on_fail:TRUE);

res = strcat(w[0], w[1], '\r\n', w[2]);

# There's a problem if we get in.
if ("UserDN: cn=admin-serv" >< res) security_hole(port);
else audit(AUDIT_LISTEN_NOT_VULN, "Sun ONE Administration Server", port);