WebMethods Integration Server 10.15.0.0000-0092 Improper Access on Login Page
WebMethods Integration Server 10.15.0.0000-0092版本存在漏洞,允许攻击者通过发送任意用户名和空白密码访问管理面板,并获取服务器主机名、版本信息及管理API端点。 2025-5-6 20:39:6 Author: cxsecurity.com(查看原文) 阅读量:14 收藏

# Exploit Title: WebMethods Integration Server 10.15.0.0000-0092 - Improper Access on Login Page # Date: 25-01-2024 # Exploit Author: Rasime Ekici # Vendor Homepage: www.softwareag.com # Version: 10.15.0000-0092 # Tested on: 10.15.0000-0092 # CVE : 2024-23733 Description: The /WmAdmin/,/invoke/vm.server/login login page in the Integration Server in Software AG webMethods 10.15.0 before Core Fix7 allows remote attackers to reach the administration panel,discovering server hostname and version information by sending arbitary username and blank password to the /WmAdmin/#/login/ uri Interpret the http traffic and send a dummy username with blank password on login screen and drop the request to "/admin/navigation/license" to not logged out.Thus you may able to see: -real hostname of the installed server -version info -administrative api endpoints



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025050017
如有侵权请联系:admin#unsafe.sh