.. / CVE-2010-0219

Exploit for Apache Axis2 Default Login (CVE-2010-0219)

Description:

Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.

Proof of Concept

PoC exploit

Nuclei Template

View the template here CVE-2010-0219.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2010/CVE-2010-0219.yaml
Copy

References:

http://www.vupen.com/english/advisories/2010/2673
https://knowledge.broadcom.com/external/article/13994/vulnerability-axis2-default-administrato.html
http://www.rapid7.com/security-center/advisories/R7-0037.jsp
http://retrogod.altervista.org/9sg_ca_d2d.html
https://nvd.nist.gov/vuln/detail/CVE-2010-0219