Korean
<< Back
VID 22411
Severity 30
Port 8022, ...
Protocol TCP
Class WWW
Detailed Description The Ipswitch WhatsUp Professional is vulnerable to a remote authentication bypass vulnerability. Ipswitch WhatsUp Professional is used to monitor states of applications, services and hosts. Ipswitch WhatsUp Professional 2006 only verifies the users identity via HTTP headers, which allows a remote attacker to spoof being a trusted console and bypass authentication by setting HTTP "User-Agent" header to "Ipswitch/1.0" and the "User-Application" header to "NmConsole". A remote attacker could exploit this flaw to gain unauthorized access to the administrative console.

* References:
http://www.ftusecurity.com/pub/whatsup.public.pdf
http://www.securityfocus.com/archive/1/434247/30/0/threaded
http://www.frsirt.com/english/advisories/2006/1849
http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046095.html

* Platforms Affected:
Ipswitch WhatsUp Professional 2006 Any version
Microsoft Windows Any version
Recommendation No upgrade or patch available as of May 2006.

Upgrade to a version of Ipswitch WhatsUp Professional, when new fixed version becomes available from the Ipswitch Products Download Web site at http://www.ipswitch.com/downloads/updates.asp
Related URL CVE-2006-2531 (CVE)
Related URL 18019 (SecurityFocus)
Related URL 26529 (ISS)