Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Ocean12 ASP Calendar Administrative Access


Vulnerability Assessment Details

Ocean12 ASP Calendar Administrative Access

Vulnerability Assessment Summary
auth bypass test

Detailed Explanation for this Vulnerability Assessment

The remote host is running Ocean12 ASP Calendar, a web based
application written in ASP.

There is a flaw in the remote software which may permit anyone
execute admnistrative commands on the remote host by requesting
the page /admin/main.asp.

A possible hacker may exploit this flaw to deface the remote site without
any credentials.

Solution : Upgrade to the latest version of this software
Network Security Threat Level: High

Networks Security ID: 11931

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

magnaroute LLC PW-17 Multi-Vendor Rack Mount Kit for select 17.3" wide Cisco, D-
$20.99
magnaroute LLC PW-17 Multi-Vendor Rack Mount Kit for select 17.3Cisco Catalyst 2960 Series Switch Cisco Catalyst 2960 Series Switch
$105.29
Cisco Catalyst 2960 Series Switch Cisco Catalyst 2960 Series Switch  pictureCisco 3560G Series 24 WS-C3650G-24TS-S Network Switch
$134.99
Cisco 3560G Series 24 WS-C3650G-24TS-S Network Switch  pictureCisco SF100-16 16 Port Unmanaged Fast Ethernet Switch
$122.39
Cisco SF100-16 16 Port Unmanaged Fast Ethernet Switch picture


Discussions

No Discussions have been posted on this vulnerability.