Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Netware >> Novell Groupwise Servlet Manager default password


Vulnerability Assessment Details

Novell Groupwise Servlet Manager default password

Vulnerability Assessment Summary
Checks for Netware servlet server default password

Detailed Explanation for this Vulnerability Assessment

The Novell Groupwise servlet server is configured with the default password.
As a result, users could be denied access to mail and other servlet
based resources.

To test this finding:

https:///servlet/ServletManager/

enter 'servlet' for the user and 'manager' for the password.

Solution: Change the default password

Edit SYS:\JAVA\SERVLETS\SERVLET.PROPERTIES

change the username and password in this section
servlet.ServletManager.initArgs=datamethod=POST,user=servlet,password=manager,bgcolor

See also: http://www.securityfocus.com/bid/3697

Network Security Threat Level: Medium

Networks Security ID: 3697

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Kyger

Cables, Connectors

IBM System X3650 7979-AC1
$299.99
IBM System X3650 7979-AC1 pictureIBM System X 42D0678 MBE2147RC 146GB 15K SAS 2.5" Server Hard Drive w/ Caddy
$19.9
IBM System X 42D0678 MBE2147RC 146GB 15K SAS 2.5(2x) IBM VR085U028CS Server VRM Voltage Regulator Module 073-20795-03U REV H & J
$24.89
(2x) IBM VR085U028CS Server VRM Voltage Regulator Module 073-20795-03U REV H & J pictureServer RAM 32GB 8x 4GB PC2-5300P ECC REG DDR2 667 PC5300 Memory FITS Dell HP IBM
$23.95
Server RAM 32GB 8x 4GB PC2-5300P ECC REG DDR2 667 PC5300 Memory FITS Dell HP IBM picture


Discussions

No Discussions have been posted on this vulnerability.