java:jboss
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
java:jboss [2010/10/15 12:43] – creado rlunaro | java:jboss [2024/10/05 17:00] (current) – rlunaro | ||
---|---|---|---|
Line 2: | Line 2: | ||
Ultimamente me estoy peleando con jboss. Como de cualquier pelea, se aprende algo. Así que anotamos lo que hemos aprendido. | Ultimamente me estoy peleando con jboss. Como de cualquier pelea, se aprende algo. Así que anotamos lo que hemos aprendido. | ||
+ | |||
+ | * [[LdapExtLoginModule]] | ||
+ | * [[LDAPConfigFromTheGround|Configuring LDAP for an application from the ground]] | ||
+ | * [[http:// | ||
+ | * [[StaticMiniSiteInJBoss|How to create a mini web site to serve static content]] | ||
+ | |||
+ | |||
===== Version JBoss [The Oracle] 5.1.0.GA ===== | ===== Version JBoss [The Oracle] 5.1.0.GA ===== | ||
Line 19: | Line 26: | ||
</ | </ | ||
</ | </ | ||
+ | |||
+ | y se obra el milagro milagrete: | ||
+ | |||
+ | < | ||
+ | 2010-10-15 14: | ||
+ | </ | ||
+ | |||
+ | ==== Como hacer que jboss sea visible desde fuera de mi máquina ==== | ||
+ | |||
+ | Una cosa que me ha tenido bastante desconcertado es el hecho de que jboss no es visible desde fuera de la máquina donde está instalado. Mirando por aquí y por allí, he visto que para conseguir que sea visible desde fuera, hay que configurar la propiedad '' | ||
+ | |||
+ | Parece ser que los muchachos de jboss, tan atentos ellos como siempre, han dejado ese asunto al pairo y hay que establecer eso como un parámetro que se pasa al ejecutar el servidor. | ||
+ | |||
+ | **¿Cómo podemos hacerlo un poco más elaborado??? | ||
+ | |||
+ | Es sencillo, yo he modificado el fichero '' | ||
+ | |||
+ | En '' | ||
+ | |||
+ | < | ||
+ | rem jboss bind addess: listen for all the interfaces | ||
+ | rem set BIND_ADDRESS=" | ||
+ | set BIND_ADDRESS=" | ||
+ | </ | ||
+ | |||
+ | |||
+ | lo que nos permitirá establecer sobre qué dirección queremos que escuche jboss. Por defecto, 0.0.0.0 son "todas las posibles" | ||
+ | |||
+ | En '' | ||
+ | |||
+ | < | ||
+ | |||
+ | :RESTART | ||
+ | " | ||
+ | | ||
+ | | ||
+ | | ||
+ | |||
+ | if ERRORLEVEL 10 goto RESTART | ||
+ | |||
+ | </ | ||
+ | |||
+ | ==== Securing JMX Console ==== | ||
+ | |||
+ | I am copying this webpage: | ||
+ | |||
+ | [[http:// | ||
+ | |||
+ | because I found very interesting: | ||
+ | |||
+ | Exploitation and Remediation of JBoss Application Server default configuration vulnerability | ||
+ | |||
+ | A lot of servers these days are found to have their JBoss Management Console open to the world, without any authentication, | ||
+ | |||
+ | A huge and silly vulnerability! | ||
+ | |||
+ | JBoss Management Console or JMX-Console provides a view into the microkernel of the Jboss application server, as well as access to the MBeans of the application server. This console can be used to configure the MBeans of the JBoss server. | ||
+ | |||
+ | What an attacker can do? | ||
+ | |||
+ | Any remote user can completely control the server, having full control to a lot of server configurations and internal network and infrastructure information disclosure, you can change the web service listening port (I test this with one of them, then I put back the original port), view internal IPs and start connections to a client, a lot of server absolute paths, you can change security configurations… too much power with almost no knowledge needed. | ||
+ | |||
+ | Two most common exploitation scenarios: | ||
+ | Shutting down JBoss with the JMX Console | ||
+ | Open the JMXConsole in your browser (for example: http:// | ||
+ | |||
+ | Navigate to the jboss.system: | ||
+ | : you can probably just CTRL-F and enter in the dialog box) | ||
+ | |||
+ | Click on the jboss.system: | ||
+ | |||
+ | Scroll down to " | ||
+ | |||
+ | Say bye bye to JBoss. | ||
+ | |||
+ | Inclusion of malicious URLs using the DeploymentScanner: | ||
+ | |||
+ | It is necessary to create a WAR file with WEB-INF a JSP to execute system commands. | ||
+ | |||
+ | Navigate the browser to the | ||
+ | |||
+ | jboss.deployment: | ||
+ | |||
+ | type=DeploymentScanner mbean | ||
+ | |||
+ | (http:// | ||
+ | |||
+ | Add the URL of the customized WAR file with the addURL() command | ||
+ | |||
+ | Access the deployed application and start executing commands with the same privilege assigned to the Application server itself. | ||
+ | |||
+ | How to guard against: | ||
+ | |||
+ | Secure the JMX Console using a username/ | ||
+ | |||
+ | Locate the jmx-console.war directory. Normally found in server/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Secure the JMX Console using your own JAAS domain | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Redeploy the application | ||
+ | |||
+ | Secure the web console | ||
+ | |||
+ | In the deploy directory, locate management/ | ||
+ | |||
+ | |||
+ | Read more: http:// | ||
+ | Under Creative Commons License: Attribution | ||
+ | |||
+ |
java/jboss.1287146615.txt.gz · Last modified: 2022/12/02 21:02 (external edit)