ID CVE-2006-2738
Summary The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed. Exploit only works on Open Source versions of this product.
References
Vulnerable Configurations
  • cpe:2.3:a:open-xchange:open-xchange:0.8.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:open-xchange:open-xchange:0.8.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:open-xchange:open-xchange:*:*:*:*:*:*:*:*
    cpe:2.3:a:open-xchange:open-xchange:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:41)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 18115
bugtraq 20060526 Wavecon Advisory: Open-Xchange <= 0.8.2 defaultuser with /bin/bash and default password
confirm http://www.open-xchange.org/bugzilla/show_bug.cgi?id=2815
misc http://www.golem.de/0605/45407.html
secunia 20323
sreason 1012
vupen ADV-2006-2037
xf openxchange-ldap-default-account(26761)
Last major update 18-10-2018 - 16:41
Published 01-06-2006 - 10:02
Last modified 18-10-2018 - 16:41
Back to Top