Описание
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
Ссылки
- Vendor Advisory
- Exploit
- US Government Resource
- Exploit
- Vendor Advisory
- Patch
- Vendor Advisory
- Exploit
- US Government Resource
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:axis2:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:axis2:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:axis2:1.6:*:*:*:*:*:*:*
cpe:2.3:a:sap:businessobjects:3.2:*:enterprise_xi:*:*:*:*:*
EPSS
Процентиль: 100%
0.93421
Критический
10 Critical
CVSS2
Дефекты
CWE-255
Связанные уязвимости
github
почти 4 года назад
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
EPSS
Процентиль: 100%
0.93421
Критический
10 Critical
CVSS2
Дефекты
CWE-255