Описание
The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed.
Ссылки
- PatchVendor Advisory
- Patch
- Patch
- PatchVendor Advisory
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1Версия до 0.8.2 (включая)
Одно из
cpe:2.3:a:open-xchange:open-xchange:*:*:*:*:*:*:*:*
cpe:2.3:a:open-xchange:open-xchange:0.8.1.6:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.01269
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed.
EPSS
Процентиль: 79%
0.01269
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other