ID

VAR-200605-0368


CVE

CVE-2006-2531


TITLE

Ipswitch WhatsUp Professional Authentication bypass vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200605-397

DESCRIPTION

Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole". Ipswitch WhatsUp Professional 2006 is susceptible to a remote authentication-bypass vulnerability. This issue allows remote attackers to gain administrative access to the web-based administrative interface of the application. This will aid them in further network attacks. Whatsup Professional software is a tool developed by Ipswitch to monitor the network status of TCP/IP, NetBEUI and IPX. What\'\'s Up Professional 2006 has an authentication bypass vulnerability, an attacker can bypass the authentication mechanism and log in without credentials. An attacker can trick the application into believing that the request is coming from the console, which is trusted, by sending HTTP requests with specially crafted headers

Trust: 1.26

sources: NVD: CVE-2006-2531 // BID: 18019 // VULHUB: VHN-18639

AFFECTED PRODUCTS

vendor:ipswitchmodel:whatsupscope:eqversion:professional_2006

Trust: 1.6

vendor:ipswitchmodel:whatsup professionalscope:eqversion:20060

Trust: 0.3

vendor:ipswitchmodel:whatsup professionalscope:neversion:2006.01

Trust: 0.3

sources: BID: 18019 // CNNVD: CNNVD-200605-397 // NVD: CVE-2006-2531

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2531
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200605-397
value: HIGH

Trust: 0.6

VULHUB: VHN-18639
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-2531
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-18639
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18639 // CNNVD: CNNVD-200605-397 // NVD: CVE-2006-2531

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2531

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200605-397

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200605-397

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-18639

EXTERNAL IDS

db:BIDid:18019

Trust: 2.0

db:NVDid:CVE-2006-2531

Trust: 1.7

db:VUPENid:ADV-2006-1849

Trust: 1.7

db:CNNVDid:CNNVD-200605-397

Trust: 0.7

db:BUGTRAQid:20060517 WHAT'S UP PROFESSIONAL SPOOFING AUTHENTICATION BYPASS

Trust: 0.6

db:BUGTRAQid:20060517 RE: [FULL-DISCLOSURE] WHAT'S UP PROFESSIONAL SPOOFING AUTHENTICATION BYPASS

Trust: 0.6

db:XFid:26529

Trust: 0.6

db:SEEBUGid:SSVID-81482

Trust: 0.1

db:EXPLOIT-DBid:27891

Trust: 0.1

db:VULHUBid:VHN-18639

Trust: 0.1

sources: VULHUB: VHN-18639 // BID: 18019 // CNNVD: CNNVD-200605-397 // NVD: CVE-2006-2531

REFERENCES

url:http://www.ftusecurity.com/pub/whatsup.public.pdf

Trust: 2.0

url:http://www.securityfocus.com/bid/18019

Trust: 1.7

url:http://www.securityfocus.com/archive/1/434447/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/434247/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/1849

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26529

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/434447/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/434247/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26529

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/1849

Trust: 0.6

url:http://www.ipswitch.com/products/network-management.asp

Trust: 0.3

url:http://www.ipswitch.com/support/whatsup_professional/releases/wup200601.asp

Trust: 0.3

url:/archive/1/434247

Trust: 0.3

sources: VULHUB: VHN-18639 // BID: 18019 // CNNVD: CNNVD-200605-397 // NVD: CVE-2006-2531

CREDITS

Kenneth F. Belva ken@ftusecurity.com

Trust: 0.6

sources: CNNVD: CNNVD-200605-397

SOURCES

db:VULHUBid:VHN-18639
db:BIDid:18019
db:CNNVDid:CNNVD-200605-397
db:NVDid:CVE-2006-2531

LAST UPDATE DATE

2024-08-14T14:08:34.386000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18639date:2018-10-18T00:00:00
db:BIDid:18019date:2006-06-29T16:04:00
db:CNNVDid:CNNVD-200605-397date:2013-01-08T00:00:00
db:NVDid:CVE-2006-2531date:2018-10-18T16:40:34.367

SOURCES RELEASE DATE

db:VULHUBid:VHN-18639date:2006-05-22T00:00:00
db:BIDid:18019date:2006-05-17T00:00:00
db:CNNVDid:CNNVD-200605-397date:2006-05-22T00:00:00
db:NVDid:CVE-2006-2531date:2006-05-22T23:10:00