19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

674 Chapter 18 n Attacking <strong>the</strong> Application Server<br />

Figure 18-3: Using Metasploit to compromise a vulnerable Tomcat server<br />

JMX<br />

The JMX console, installed by default within a JBoss installation, is a classic<br />

example of powerful default content. The JMX console is described as a “raw<br />

view into <strong>the</strong> microkernel of <strong>the</strong> JBoss Application Server.” In fact, it allows you<br />

to access any Managed Beans within <strong>the</strong> JBoss Application Server directly. Due<br />

to <strong>the</strong> sheer amount of functionality available, numerous security vulnerabilities<br />

have been reported. Among <strong>the</strong> easiest to exploit is <strong>the</strong> ability to use <strong>the</strong> store<br />

method within <strong>the</strong> DeploymentFileRepository to create a war file containing<br />

a backdoor, as shown in Figure 18-4.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!