Remote Code Execution and repair caused by improper application management of Lily net

Source: Internet
Author: User

Brief description: The application is not configured for security. You can remotely access the system.
Description: The jmx-console can be accessed anonymously.




You can then use the default vulnerability configuration.




Finally, you can smoothly intrude into the Intranet.




Proof of vulnerability:


172.16.x.x xxx.20.he.com

Root: x: 0: 0: root:/bin/bash

Bin: x: 1: 1: bin:/sbin/nologin

Daemon: x: 2: 2: daemon:/sbin/nologin

Adm: x: 3: 4: adm:/var/adm:/sbin/nologin

Lp: x: 4: 7: lp:/var/spool/lpd:/sbin/nologin

Sync: x: 5: 0: sync:/sbin:/bin/sync

Shutdown: x: 6: 0: shutdown:/sbin/shutdown

Halt: x: 7: 0: halt:/sbin/halt

Mail: x: 8: 12: mail:/var/spool/mail:/sbin/nologin

News: x: 9: 13: news:/etc/news:

Uucp: x: 10: 14: uucp:/var/spool/uucp:/sbin/nologin

Operator: x: 11: 0: operator:/root:/sbin/nologin

Games: x: 12: 100: games:/usr/games:/sbin/nologin

Gopher: x: 13: 30: gopher:/var/gopher:/sbin/nologin

Ftp: x: 14: 50: FTP User:/var/ftp:/sbin/nologin

Nobody: x: 99: 99: Nobody: // sbin/nologin

Nscd: x: 28: 28: NSCD Daemon: // sbin/nologin

Vcsa: x: 69: 69: virtual console memory owner:/dev:/sbin/nologin

Rpc: x: 32: 32: Portmapper RPC user: // sbin/nologin

Mailnull: x: 47: 47:/var/spool/mqueue:/sbin/nologin

Smmsp: x: 51: 51:/var/spool/mqueue:/sbin/nologin

Oprofile: x: 16: 16: Special user account to be used by OProfile:/home/oprofile:/sbin/nologin

Pcap: x: 77: 77:/var/arpwatch:/sbin/nologin

Ntp: x: 38: 38:/etc/ntp:/sbin/nologin

Messages: x: 81: 81: System message bus: // sbin/nologin

Avahi: x: 70: 70: Avahi daemon: // sbin/nologin

Sshd: x: 74: 74: Privilege-separated SSH:/var/empty/sshd:/sbin/nologin

Rpcuser: x: 29: 29: RPC Service User:/var/lib/nfs:/sbin/nologin

Nfsnobody: x: 65534: 65534: Anonymous NFS User:/var/lib/nfs:/sbin/nologin

Haldaemon: x: 68: 68: HAL daemon: // sbin/nologin

Xfs: x: 43: 43: X Font Server:/etc/X11/fs:/sbin/nologin

Avahi-autoipd: x: 100: 104: avahi-autoipd:/var/lib/avahi-autoipd:/sbin/nologin

Zhaojc: x: 50008: 50001:/home/maintain/:/bin/bash

Yanfeng: x: 50022: 50001:/home/maintain/:/bin/bash

Dongchangsheng: x: 51113: 50001:/home/maintain/:/bin/bash

Zhoujj: x: 50026: 50001:/home/maintain/:/bin/bash

Bkremote: x: 50000: 50000:/home/bkremote:/bin/bash

Java: x: 51114: 50003:/home/java:/bin/bash

Nagios: x: 51115: 51115:/dev/null:/bin/nologin

Solution: delete related items or perform user authentication.

Hacking Jboss (http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.