VID |
22411 |
Severity |
30 |
Port |
8022, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The Ipswitch WhatsUp Professional is vulnerable to a remote authentication bypass vulnerability. Ipswitch WhatsUp Professional is used to monitor states of applications, services and hosts. Ipswitch WhatsUp Professional 2006 only verifies the users identity via HTTP headers, which allows a remote attacker to spoof being a trusted console and bypass authentication by setting HTTP "User-Agent" header to "Ipswitch/1.0" and the "User-Application" header to "NmConsole". A remote attacker could exploit this flaw to gain unauthorized access to the administrative console.
* References: http://www.ftusecurity.com/pub/whatsup.public.pdf http://www.securityfocus.com/archive/1/434247/30/0/threaded http://www.frsirt.com/english/advisories/2006/1849 http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046095.html
* Platforms Affected: Ipswitch WhatsUp Professional 2006 Any version Microsoft Windows Any version |
Recommendation |
No upgrade or patch available as of May 2006.
Upgrade to a version of Ipswitch WhatsUp Professional, when new fixed version becomes available from the Ipswitch Products Download Web site at http://www.ipswitch.com/downloads/updates.asp |
Related URL |
CVE-2006-2531 (CVE) |
Related URL |
18019 (SecurityFocus) |
Related URL |
26529 (ISS) |
|