CVE-2010-0219
Severity CVSS v4.0:
Pending analysis
Type:
CWE-255
Credentials Management
Publication date:
18/10/2010
Last modified:
11/04/2025
Description
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:axis2:1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:axis2:1.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:axis2:1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:axis2:1.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:axis2:1.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:axis2:1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:businessobjects:3.2:*:enterprise_xi:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://retrogod.altervista.org/9sg_ca_d2d.html
- http://secunia.com/advisories/41799
- http://secunia.com/advisories/42763
- http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
- http://www.exploit-db.com/exploits/15869
- http://www.kb.cert.org/vuls/id/989719
- http://www.osvdb.org/70233
- http://www.rapid7.com/security-center/advisories/R7-0037.jsp
- http://www.securityfocus.com/archive/1/514284/100/0/threaded
- http://www.securitytracker.com/id?1024929=
- http://www.vupen.com/english/advisories/2010/2673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/62523
- https://kb.juniper.net/KB27373
- https://service.sap.com/sap/support/notes/1432881
- http://retrogod.altervista.org/9sg_ca_d2d.html
- http://secunia.com/advisories/41799
- http://secunia.com/advisories/42763
- http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf
- http://www.exploit-db.com/exploits/15869
- http://www.kb.cert.org/vuls/id/989719
- http://www.osvdb.org/70233
- http://www.rapid7.com/security-center/advisories/R7-0037.jsp
- http://www.securityfocus.com/archive/1/514284/100/0/threaded
- http://www.securitytracker.com/id?1024929=
- http://www.vupen.com/english/advisories/2010/2673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/62523
- https://kb.juniper.net/KB27373
- https://service.sap.com/sap/support/notes/1432881



