Insecure default settings in Reporter

Back to all Security AdvisoriesFollow
Security Advisories ID: 
Published Date: 
December 12, 2012
Advisory Status: 
Advisory Severity: 
CVSS v2 base score: 8.3 (AV:A/AC:L/Au:N/C:C/I:C/A:C)
CVE Number: 
No CVE has been assigned at this time.

By default, logging in to Reporter is performed over HTTP, allowing an attacker to gain access to the Administrator’s credentials and all session data. Disconnected login is also enabled by default thereby storing the Administrator’s LDAP password on Reporter.

Affected Products: 

All versions of Reporter prior to 9.4 are vulnerable. Windows, Linux, and Virtual Appliance versions are all vulnerable.

Advisory Details: 

Reporter does not default secure when installed with the default configuration values.

By default, administrative connections go over a clear text channel (HTTP) allowing an attacker with access to the network to view, replay, and modify all login and session data.

Disconnected login is also enabled by default in 9.x releases.Disconnected login stores the password used by the Administrator locally with minimal obfuscation. An attacker who is able to de-obfuscate the password will thereby be able to log in to Reporter as the Administrator and will be able to log in to the configured LDAP directory.

Reporter 9.3 and later defaults to HTTPS for administrative connections and redirects HTTP connections to HTTPS. Reporter also disables disconnected login by default.


Configure Reporter to support HTTPS for management connections and always connect to Reporter over HTTPS. Disable disconnected login.


Reporter 9.3 – a fix is available in The fix is available to customers with a valid BlueTouch Online login from
Reporter 9.2 and earlier
– please upgrade to a later version.
Reporter 8.3 and earlier – please upgrade to a later version.


Reporter 9.x Administrators Guide –

Reporter 8.x Administrators Guide –

Advisory History: 

2012-12-12 Initial public release