ID CVE-2010-0219
Summary Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
References
Vulnerable Configurations
  • Apache Software Foundation Axis 1.3
    cpe:2.3:a:apache:axis2:1.3
  • Apache Software Foundation Axis2/
    cpe:2.3:a:apache:axis2:1.4
  • Apache Software Foundation Axis2.4.1
    cpe:2.3:a:apache:axis2:1.4.1
  • Apache Software Foundation Axis2.5
    cpe:2.3:a:apache:axis2:1.5
  • Apache Software Foundation Axis2.5.1
    cpe:2.3:a:apache:axis2:1.5.1
  • Apache Software Foundation Axis2.5.2
    cpe:2.3:a:apache:axis2:1.5.2
  • Apache Software Foundation Axis2.6
    cpe:2.3:a:apache:axis2:1.6
  • cpe:2.3:a:sap:businessobjects:3.2:-:enterprise_xi
    cpe:2.3:a:sap:businessobjects:3.2:-:enterprise_xi
CVSS
Base: 10.0 (as of 18-10-2010 - 15:22)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
  • description Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP). CVE-2010-0219. Remote exploits for multiple platform
    id EDB-ID:16315
    last seen 2016-02-01
    modified 2010-12-14
    published 2010-12-14
    reporter metasploit
    source https://www.exploit-db.com/download/16315/
    title Axis2 / SAP BusinessObjects Authenticated Code Execution via SOAP
  • description CA ARCserve D2D r15 - Web Service Servlet Code Execution. CVE-2010-0219. Remote exploit for windows platform
    file exploits/windows/remote/15869.txt
    id EDB-ID:15869
    last seen 2016-02-01
    modified 2010-12-30
    platform windows
    port
    published 2010-12-30
    reporter rgod
    source https://www.exploit-db.com/download/15869/
    title CA ARCserve D2D r15 - Web Service Servlet Code Execution
    type remote
  • description Axis2 Authenticated Code Execution (via REST). CVE-2010-0219. Remote exploits for multiple platform
    id EDB-ID:16312
    last seen 2016-02-01
    modified 2010-12-14
    published 2010-12-14
    reporter metasploit
    source https://www.exploit-db.com/download/16312/
    title Axis2 - Authenticated Code Execution via REST
metasploit via4
nessus via4
NASL family CGI abuses
NASL id APACHE_AXIS2_DEFAULT_CREDS.NASL
description The installation of Apache Axis2 hosted on the remote web server uses a default set of credentials to control access to its administrative console. A remote attacker can exploit this to gain administrative control.
last seen 2019-02-21
modified 2018-11-15
plugin id 46740
published 2010-05-27
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=46740
title Apache Axis2 Default Credentials
packetstorm via4
refmap via4
bugtraq 20101014 R7-0037: SAP BusinessObjects Axis2 Default Admin Password
cert-vn VU#989719
confirm https://kb.juniper.net/KB27373
exploit-db 15869
misc
osvdb 70233
sectrack 1024929
secunia
  • 41799
  • 42763
vupen ADV-2010-2673
xf businessobjects-dswsbobje-security-bypass(62523)
saint via4
  • bid 45625
    description CA ARCserve D2D Axis2 default password
    id misc_arcservecategory_d2d
    osvdb 70233
    title brightstor_arcserve_d2d_axis2_pass
    type remote
  • bid 45625
    description HP Universal CMDB Server Axis2 default password
    id misc_hpuniversalcmdbpwd
    osvdb 70233
    title hp_ucmdb_svr_axis2_defaultcred
    type remote
Last major update 09-05-2013 - 23:14
Published 18-10-2010 - 13:00
Last modified 10-10-2018 - 15:51
Back to Top