当前位置:网站首页>JMX Console 未授权访问漏洞
JMX Console 未授权访问漏洞
2022-07-24 08:16:00 【曲折上升】
漏洞详情
Jboss的webUI界面 http://ip:port/jmx-console 未授权访问(或默认密码admin/admin ),可导致JBoss的部署管理的信息泄露,攻击者也可以直接上传木马获取 webshell。
影响范围
所有低版本
Docker搭建靶场环境
docker search testjboss
docker pull testjboss/jobss
docker run -p 8080:8080 -d testjboss/jboss
漏洞复现
访问靶场地址。如图搭建成功。

访问http://ip:8080/jmx-console/如果能直接进入或者通过默认账号密码登录则代表存在漏洞。

远程部署war包。
找到 jboss.deployment 选项flavor=URL,type=DeploymentScanner 点进去。
进入页面后找到 void addURL()

此时部署我们远程的war木马。(需要jdk环境)


在浏览器访问地址,获得war包路径。


然后点击 Invoke 部署

随后来到 URLList 中查看 Value 值是否已经部署好,并且为我们的远程war木马地址。


- 找到 jboss.web.deployment 查看是否存在我们部署的war木马。

- 此时可以看到已经部署成功。

- 访问地址:http://ip/cmd/shell.jsp(eg:aaa.war ;cmd=aaa)
防护建议
1、对jmx-console和web-console界面访问增加强认证。
2、关闭jmx-console和web-console,提高安全性。
边栏推荐
- Wechat applet file types and functions
- [wechat applet development] (I) development environment and applet official account application
- Upload and insert the execle table into the database based on ThinkPHP
- [wechat applet development (native)] canvas animation
- *Yolo5 learning * data experiment based on yolo5 face combined with attention model CBAM
- Use of animation expert motionlayout layout
- 赛宁TechTalk丨攻防演练:攻击组合拳 “稳准狠”渗透
- [wechat applet development] (II) wechat native bottom tabbar configuration
- Markdown basic grammar learning
- P3916图的遍历 题解
猜你喜欢

*Yolo5 learning * data experiment based on yolo5 face combined with attention model CBAM

Full revolutionary Siamese networks for object tracking translation

rbm 对比散度

Decision tree - ID3, C4.5, cart

As skillfully uses idea annotation to improve collaboration / development efficiency

Figure New Earth: how the RVT format BIM model modeled by Revit can accurately match the map with texture

*Yolo5 learning * data experiment based on yolo5 face combined with attention model se

图新地球:Revit建模的rvt格式BIM模型如何带着纹理精准匹配地图

Robert operator, Sobel operator, Laplace operator

You can't access this shared folder because your organization's security policies prevent unauthenticated guests from accessing it. These policies can help protect your computer from unsafe or malicio
随机推荐
Database | simple hospital patient appointment system based on opengauss
Decision tree - ID3, C4.5, cart
Wechat applet host environment, applet architecture, concise operation structure
Go: Gin basicauth Middleware
Recognition and storage of Graphs
rbm 对比散度
FPGA综合项目——图像边缘检测系统
[shutter] the shutter doctor reports an error
[golang from introduction to practice] student achievement management system
Saining Techtalk attack and defense drill: attack combination fist "stable, accurate and ruthless" penetration
SVG 从入门到后悔,怎么不早点学起来(图解版)
Several development frameworks based on openresty
VIDAR team team exclusive interview: as we do, as you know
【JDBC】JDBC经典面试题,持续更新中......
P1135 strange elevator problem solution
how to add square on screenshot
[Game Collection] mobile phones are about to burst, and a collection of six high-quality pyGame games is coming ~ (source code attached)
Introduction of some functions or methods in DGL Library
*Yolo5 learning * data experiment based on yolo5 face combined with attention model CBAM
Code=6 'The connection has timed out unexpectedly