Brief description: The application is not configured for security. You can remotely access the system.
Description: The jmx-console can be accessed anonymously.
You can then use the default vulnerability configuration.
Finally, you can smoothly intrude into the Intranet.
Proof of vulnerability:
172.16.x.x xxx.20.he.com
Root: x: 0: 0: root:/bin/bash
Bin: x: 1: 1: bin:/sbin/nologin
Daemon: x: 2: 2: daemon:/sbin/nologin
Adm: x: 3: 4: adm:/var/adm:/sbin/nologin
Lp: x: 4: 7: lp:/var/spool/lpd:/sbin/nologin
Sync: x: 5: 0: sync:/sbin:/bin/sync
Shutdown: x: 6: 0: shutdown:/sbin/shutdown
Halt: x: 7: 0: halt:/sbin/halt
Mail: x: 8: 12: mail:/var/spool/mail:/sbin/nologin
News: x: 9: 13: news:/etc/news:
Uucp: x: 10: 14: uucp:/var/spool/uucp:/sbin/nologin
Operator: x: 11: 0: operator:/root:/sbin/nologin
Games: x: 12: 100: games:/usr/games:/sbin/nologin
Gopher: x: 13: 30: gopher:/var/gopher:/sbin/nologin
Ftp: x: 14: 50: FTP User:/var/ftp:/sbin/nologin
Nobody: x: 99: 99: Nobody: // sbin/nologin
Nscd: x: 28: 28: NSCD Daemon: // sbin/nologin
Vcsa: x: 69: 69: virtual console memory owner:/dev:/sbin/nologin
Rpc: x: 32: 32: Portmapper RPC user: // sbin/nologin
Mailnull: x: 47: 47:/var/spool/mqueue:/sbin/nologin
Smmsp: x: 51: 51:/var/spool/mqueue:/sbin/nologin
Oprofile: x: 16: 16: Special user account to be used by OProfile:/home/oprofile:/sbin/nologin
Pcap: x: 77: 77:/var/arpwatch:/sbin/nologin
Ntp: x: 38: 38:/etc/ntp:/sbin/nologin
Messages: x: 81: 81: System message bus: // sbin/nologin
Avahi: x: 70: 70: Avahi daemon: // sbin/nologin
Sshd: x: 74: 74: Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
Rpcuser: x: 29: 29: RPC Service User:/var/lib/nfs:/sbin/nologin
Nfsnobody: x: 65534: 65534: Anonymous NFS User:/var/lib/nfs:/sbin/nologin
Haldaemon: x: 68: 68: HAL daemon: // sbin/nologin
Xfs: x: 43: 43: X Font Server:/etc/X11/fs:/sbin/nologin
Avahi-autoipd: x: 100: 104: avahi-autoipd:/var/lib/avahi-autoipd:/sbin/nologin
Zhaojc: x: 50008: 50001:/home/maintain/:/bin/bash
Yanfeng: x: 50022: 50001:/home/maintain/:/bin/bash
Dongchangsheng: x: 51113: 50001:/home/maintain/:/bin/bash
Zhoujj: x: 50026: 50001:/home/maintain/:/bin/bash
Bkremote: x: 50000: 50000:/home/bkremote:/bin/bash
Java: x: 51114: 50003:/home/java:/bin/bash
Nagios: x: 51115: 51115:/dev/null:/bin/nologin
Solution: delete related items or perform user authentication.
Hacking Jboss (http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf)