Vulnerabilities > CVE-2010-0219 - Credentials Management vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 | |
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP). CVE-2010-0219. Remote exploits for multiple platform id EDB-ID:16315 last seen 2016-02-01 modified 2010-12-14 published 2010-12-14 reporter metasploit source https://www.exploit-db.com/download/16315/ title Axis2 / SAP BusinessObjects Authenticated Code Execution via SOAP description Axis2 Authenticated Code Execution (via REST). CVE-2010-0219. Remote exploits for multiple platform id EDB-ID:16312 last seen 2016-02-01 modified 2010-12-14 published 2010-12-14 reporter metasploit source https://www.exploit-db.com/download/16312/ title Axis2 - Authenticated Code Execution via REST description CA ARCserve D2D r15 - Web Service Servlet Code Execution. CVE-2010-0219. Remote exploit for windows platform file exploits/windows/remote/15869.txt id EDB-ID:15869 last seen 2016-02-01 modified 2010-12-30 platform windows port published 2010-12-30 reporter rgod source https://www.exploit-db.com/download/15869/ title CA ARCserve D2D r15 - Web Service Servlet Code Execution type remote
Metasploit
description This module attempts to login to an Apache Axis2 instance using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options. It has been verified to work on at least versions 1.4.1 and 1.6.2. id MSF:AUXILIARY/SCANNER/HTTP/AXIS_LOGIN last seen 2020-01-22 modified 2019-06-27 published 2013-01-02 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0219 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/axis_login.rb title Apache Axis2 Brute Force Utility description This module logs in to an Axis2 Web Admin Module instance using a specific user/pass and uploads and executes commands via deploying a malicious web service by using SOAP. id MSF:EXPLOIT/MULTI/HTTP/AXIS2_DEPLOYER last seen 2020-06-14 modified 2018-08-10 published 2012-03-18 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/axis2_deployer.rb title Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP)
Nessus
NASL family | CGI abuses |
NASL id | APACHE_AXIS2_DEFAULT_CREDS.NASL |
description | The installation of Apache Axis2 hosted on the remote web server uses a default set of credentials to control access to its administrative console. A remote attacker can exploit this to gain administrative control. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 46740 |
published | 2010-05-27 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/46740 |
title | Apache Axis2 Default Credentials |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/94773/R7-0037.txt id PACKETSTORM:94773 last seen 2016-12-05 published 2010-10-15 reporter H D Moore source https://packetstormsecurity.com/files/94773/Rapid7-Security-Advisory-37.html title Rapid7 Security Advisory 37 data source https://packetstormsecurity.com/files/download/95881/axis2_deployer.rb.txt id PACKETSTORM:95881 last seen 2016-12-05 published 2010-11-16 reporter Joshua D. Abraham source https://packetstormsecurity.com/files/95881/Axis2-SAP-BusinessObjects-dswsbobje-Upload-Exec.html title Axis2 / SAP BusinessObjects dswsbobje Upload Exec data source https://packetstormsecurity.com/files/download/96224/axis2_deployer_rest.rb.txt id PACKETSTORM:96224 last seen 2016-12-05 published 2010-12-01 reporter Joshua D. Abraham source https://packetstormsecurity.com/files/96224/Axis2-Upload-Exec-via-REST.html title Axis2 Upload Exec (via REST)
Saint
bid 45625 description HP Universal CMDB Server Axis2 default password id misc_hpuniversalcmdbpwd osvdb 70233 title hp_ucmdb_svr_axis2_defaultcred type remote bid 45625 description CA ARCserve D2D Axis2 default password id misc_arcservecategory_d2d osvdb 70233 title brightstor_arcserve_d2d_axis2_pass type remote
References
- http://retrogod.altervista.org/9sg_ca_d2d.html
- http://retrogod.altervista.org/9sg_ca_d2d.html
- http://secunia.com/advisories/41799
- http://secunia.com/advisories/41799
- http://secunia.com/advisories/42763
- http://secunia.com/advisories/42763
- http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
- http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
- http://www.exploit-db.com/exploits/15869
- http://www.exploit-db.com/exploits/15869
- http://www.kb.cert.org/vuls/id/989719
- http://www.kb.cert.org/vuls/id/989719
- http://www.osvdb.org/70233
- http://www.osvdb.org/70233
- http://www.rapid7.com/security-center/advisories/R7-0037.jsp
- http://www.rapid7.com/security-center/advisories/R7-0037.jsp
- http://www.securityfocus.com/archive/1/514284/100/0/threaded
- http://www.securityfocus.com/archive/1/514284/100/0/threaded
- http://www.securitytracker.com/id?1024929
- http://www.securitytracker.com/id?1024929
- http://www.vupen.com/english/advisories/2010/2673
- http://www.vupen.com/english/advisories/2010/2673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/62523
- https://exchange.xforce.ibmcloud.com/vulnerabilities/62523
- https://kb.juniper.net/KB27373
- https://kb.juniper.net/KB27373
- https://service.sap.com/sap/support/notes/1432881
- https://service.sap.com/sap/support/notes/1432881