1.4 KiB
1.4 KiB
CVE-2010-0219
Description
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
POC
Reference
- http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
- http://www.exploit-db.com/exploits/15869
Github
- https://github.com/20142995/Goby
- https://github.com/20142995/nuclei-templates
- https://github.com/ACIC-Africa/metasploitable3
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/HimmelAward/Goby_POC
- https://github.com/NyxAzrael/Goby_POC
- https://github.com/Z0fhack/Goby_POC
- https://github.com/adamziaja/vulnerability-check
- https://github.com/geovanidps/axis2_multi_xsd_scanner
- https://github.com/ranhn/Goby-Poc
- https://github.com/ugurilgin/MoocFiProject-2
- https://github.com/veritas-rt/CVE-2010-0219