Plugin ID | 206 |
Plugin name | Novell Groupwise 6.0 Servlet Manager default password |
Plugin filename | Novell Groupwise 6.0 Servlet Manager default password.plugin |
Plugin filesize | 3679 bytes |
Plugin family | Netware |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/13 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.1 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1 |
Plugin protocol | tcp |
Plugin port | 443 |
Plugin procedure detection | open|sleep|send GET /servlet/ServletManager HTTP/1.1\nAuthorization: Basic c2VydmxldDptYW5hZ2Vy\n\n|sleep|clsose|pattern_exists ServletManager OR Servlet information |
Plugin detection accuracy | 98 |
Plugin comment | Check is inspired by the Nessus plugin (see Nessus ID listed in the sources). |
Bug published name | Adam Gray |
Bug published email | agray at novacoast dot com |
Bug published web | http://www.novacoast.com |
Bug published company | Novacoast, Inc. |
Bug published date | 2001/12/15 |
Bug advisory | http://www.securityfocus.com/archive/1/245871 |
Bug affected | Novell Groupwise 6.0 |
Bug not affected | Other solutions |
Bug vulnerability class | Weak Authentication |
Bug description | The Novell Groupwise 6.0 servlet server is configured with the default password. As a result, users could be denied access to mail and other servlet based resources. |
Bug solution | Novell has published an advisory and workaround in TID 10067329. The server should be deactivated or de-installed if not necessary. To make it harder to find the server the daemon could be configured to listen at another port (e.g. 8081). Try to prevent unwanted connection attempts by filtering traffic with firewalling. Alternation of the application banner can confuse an attacker and let him determine the wrong software. |
Bug fixing time | Approx. 1 hour |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/3697/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 7 |
Bug risk | 7 |
Bug Nessus risk | Medium |
Bug check tools | Nessus is able to do the same check. A CGI scanner as like N-Stealth, Whisker or Nikto may be able to detect this flaw too. |
Source CVE | CAN-2001-1195 |
Source SecurityFocus BID | 3697 |
Source Nessus ID | 12122 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://support.novell.com/cgi-bin/search/searchtid.cgi?/10067329.htm |