java:jboss
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
java:jboss [2010/10/18 16:10] – rlunaro | java:jboss [2024/10/05 17:00] (current) – rlunaro | ||
---|---|---|---|
Line 4: | Line 4: | ||
* [[LdapExtLoginModule]] | * [[LdapExtLoginModule]] | ||
+ | * [[LDAPConfigFromTheGround|Configuring LDAP for an application from the ground]] | ||
+ | * [[http:// | ||
+ | * [[StaticMiniSiteInJBoss|How to create a mini web site to serve static content]] | ||
+ | |||
+ | |||
===== Version JBoss [The Oracle] 5.1.0.GA ===== | ===== Version JBoss [The Oracle] 5.1.0.GA ===== | ||
Line 51: | Line 56: | ||
En '' | En '' | ||
- | </code> | + | < |
:RESTART | :RESTART | ||
" | " | ||
Line 62: | Line 68: | ||
</ | </ | ||
+ | ==== Securing JMX Console ==== | ||
+ | |||
+ | I am copying this webpage: | ||
+ | |||
+ | [[http:// | ||
+ | |||
+ | because I found very interesting: | ||
+ | |||
+ | Exploitation and Remediation of JBoss Application Server default configuration vulnerability | ||
+ | |||
+ | A lot of servers these days are found to have their JBoss Management Console open to the world, without any authentication, | ||
+ | |||
+ | A huge and silly vulnerability! | ||
+ | |||
+ | JBoss Management Console or JMX-Console provides a view into the microkernel of the Jboss application server, as well as access to the MBeans of the application server. This console can be used to configure the MBeans of the JBoss server. | ||
+ | |||
+ | What an attacker can do? | ||
+ | |||
+ | Any remote user can completely control the server, having full control to a lot of server configurations and internal network and infrastructure information disclosure, you can change the web service listening port (I test this with one of them, then I put back the original port), view internal IPs and start connections to a client, a lot of server absolute paths, you can change security configurations… too much power with almost no knowledge needed. | ||
+ | |||
+ | Two most common exploitation scenarios: | ||
+ | Shutting down JBoss with the JMX Console | ||
+ | Open the JMXConsole in your browser (for example: http:// | ||
+ | |||
+ | Navigate to the jboss.system: | ||
+ | : you can probably just CTRL-F and enter in the dialog box) | ||
+ | |||
+ | Click on the jboss.system: | ||
+ | |||
+ | Scroll down to " | ||
+ | |||
+ | Say bye bye to JBoss. | ||
+ | |||
+ | Inclusion of malicious URLs using the DeploymentScanner: | ||
+ | |||
+ | It is necessary to create a WAR file with WEB-INF a JSP to execute system commands. | ||
+ | |||
+ | Navigate the browser to the | ||
+ | |||
+ | jboss.deployment: | ||
+ | |||
+ | type=DeploymentScanner mbean | ||
+ | |||
+ | (http:// | ||
+ | |||
+ | Add the URL of the customized WAR file with the addURL() command | ||
+ | |||
+ | Access the deployed application and start executing commands with the same privilege assigned to the Application server itself. | ||
+ | |||
+ | How to guard against: | ||
+ | |||
+ | Secure the JMX Console using a username/ | ||
+ | |||
+ | Locate the jmx-console.war directory. Normally found in server/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Secure the JMX Console using your own JAAS domain | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Edit the WEB-INF/ | ||
+ | |||
+ | Redeploy the application | ||
+ | |||
+ | Secure the web console | ||
+ | |||
+ | In the deploy directory, locate management/ | ||
+ | |||
+ | |||
+ | Read more: http:// | ||
+ | Under Creative Commons License: Attribution | ||
java/jboss.1287418244.txt.gz · Last modified: 2022/12/02 21:02 (external edit)