First published: Mon Oct 18 2010(Updated: )
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | =1.3 | |
Apache HTTP Server | =1.4 | |
Apache HTTP Server | =1.4.1 | |
Apache HTTP Server | =1.5 | |
Apache HTTP Server | =1.5.1 | |
Apache HTTP Server | =1.5.2 | |
Apache HTTP Server | =1.6 | |
SAP BusinessObjects Business Intelligence | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0219 is considered a high severity vulnerability due to the risk of remote code execution associated with a default password.
To fix CVE-2010-0219, change the default admin password from 'axis2' to a strong, unique password.
CVE-2010-0219 affects Apache Axis2 versions 1.3 to 1.6 and SAP BusinessObjects Enterprise XI 3.2.
CVE-2010-0219 is a security vulnerability that allows remote attackers to execute arbitrary code.
There is no specific patch for CVE-2010-0219; the recommended action is to change the default password.