Executive Summary

Summary
Title SAP BusinessObjects Axis2 Default Admin Password
Informations
Name VU#989719 First vendor Publication 2010-10-13
Vendor VU-CERT Last vendor Modification 2010-10-14
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#989719

SAP BusinessObjects Axis2 Default Admin Password

Overview

The Axis2 component of SAP BusinessObjects contains a default administrator account and password.

I. Description

The SAP BusinessObjects product contains a module (dswsbobje.war) which deploys Axis2 with an administrator account which is configured with a static password. As a result, anyone with access to the Axis2 port can gain full access to the machine via arbitrary remote code execution. This requires the attacker to upload a malicious web service and to restart the instance of Tomcat. This issue may apply to other products and vendors that embed the Axis2 component. The username is "admin" and the password is "axis2", this is also the default for standalone Axis2 installations. Additional details may be found in the Rapid7 R7-0037 Advisory.

II. Impact

An attacker can execute arbitrary code by creating a malicious web service (jar). The attacker can log in to the Axis2 component with the default admin account, upload the malicious web service, and upon restart the malicious code will be executed.

III. Solution

The vendor has addressed this vulnerability in SAP Security Note 1432881.

Users should change the admin default password. This can be done by modifying the password value within axis2.xml

Vendor Information

VendorStatusDate NotifiedDate Updated
SAPAffected2010-10-052010-10-13

References

http://www.rapid7.com/security-center/advisories/R7-0037.jsp
http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
https://service.sap.com/sap/support/notes/1432881

Credit

Thanks to Joshua Abraham and Will Vandevanter for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

Date Public:2010-10-13
Date First Published:2010-10-13
Date Last Updated:2010-10-14
CERT Advisory: 
CVE-ID(s):CVE-2010-0219
NVD-ID(s):CVE-2010-0219
US-CERT Technical Alerts: 
Metric:0.00
Document Revision:17

Original Source

Url : http://www.kb.cert.org/vuls/id/989719

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-255 Credentials Management

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Application 1

SAINT Exploits

Description Link
CA ARCserve D2D Axis2 default password More info here
HP Universal CMDB Server Axis2 default password More info here

Open Source Vulnerability Database (OSVDB)

Id Description
68662 SAP BusinessObjects Axis2 dswsbobje.war Module Admin Account Default Password

By default, SAP BusinessObjects's dswsbobje.war module deploys axis2 with a default password. The admin account has a password of axis2 which is publicly known and documented. This allows a remote attacker to execute arbitrary code by uploading a crafted web service.

Information Assurance Vulnerability Management (IAVM)

Date Description
2011-02-17 IAVM : 2011-B-0020 - Computer Associates ARCserve Password Security Bypass Vulnerability
Severity : Category I - VMSKEY : V0026075

Snort® IPS/IDS

Date Description
2014-01-10 CA ARCserve Axis2 default credential login attempt
RuleID : 18985 - Revision : 13 - Type : POLICY-OTHER

Nessus® Vulnerability Scanner

Date Description
2010-05-27 Name : The remote web server hosts a web application that uses default credentials.
File : apache_axis2_default_creds.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:08:21
  • Multiple Updates