Sambar Server Admin Access Vulnerability

BID:2255

Info

Sambar Server Admin Access Vulnerability

Bugtraq ID: 2255
Class: Access Validation Error
CVE:
Remote: Yes
Local: Yes
Published: Jun 10 1998 12:00AM
Updated: Jun 10 1998 12:00AM
Credit: Discovered and posted to Bugtraq on June 10, 1998 by Michiel de Weerd <[email protected]>.
Vulnerable: Sambar Server 4.1 beta
Not Vulnerable:

Discussion

Sambar Server Admin Access Vulnerability

'dumpenv.pl' is a utility that will display environment information on which the server resides, this information could include the server software version being used, directory settings and path information.

The default authentication credentials for the administrator account in a Sambar Server is Username: admin with the password left blank. Once a remote user has gained knowledge of the path to log into the admin account, it is possible for the user to login to the server via an http request. This unauthorized access is gained providing that the default settings have not been changed.

Successful exploitation of this vulnerability could lead to complete compromise of the host

Exploit / POC

Sambar Server Admin Access Vulnerability

The following examples are provided by Michiel de Weerd <[email protected]>:

The following will display environment information:

http://target/cgi-bin/dumpenv.pl

The following is an example of the path to login as admin:

http://target/session/adminlogin?RCpage=/sysadmin/index.stm

References

Sambar Server Admin Access Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report