Return-Path: Delivered-To: apmail-tomcat-users-archive@www.apache.org Received: (qmail 11605 invoked from network); 11 Aug 2008 02:12:42 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 11 Aug 2008 02:12:42 -0000 Received: (qmail 55262 invoked by uid 500); 11 Aug 2008 02:12:30 -0000 Delivered-To: apmail-tomcat-users-archive@tomcat.apache.org Received: (qmail 55244 invoked by uid 500); 11 Aug 2008 02:12:30 -0000 Mailing-List: contact users-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Users List" Delivered-To: mailing list users@tomcat.apache.org Received: (qmail 55233 invoked by uid 99); 11 Aug 2008 02:12:30 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 10 Aug 2008 19:12:30 -0700 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: local policy) Received: from [206.190.48.171] (HELO web52408.mail.re2.yahoo.com) (206.190.48.171) by apache.org (qpsmtpd/0.29) with SMTP; Mon, 11 Aug 2008 02:11:33 +0000 Received: (qmail 81894 invoked by uid 60001); 11 Aug 2008 02:11:00 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Received:X-Mailer:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type:Message-ID; b=3NGNA6iiPQud23KGUA206yh/C0ihZwym+ooKff1AQR/LzKTVjZZODXL4qZsGeZEOC8vTAAF+2iIDiy61MAuo7OK54LN+9W0sOZKzwiNns5sfnFFkpqqyzzxKXHWmOd4avZj7VBNcgfb+Cbm3QsdjL8dEBjvv6jNzI7Qbaj+232o=; Received: from [117.195.16.120] by web52408.mail.re2.yahoo.com via HTTP; Sun, 10 Aug 2008 19:10:59 PDT X-Mailer: YahooMailWebService/0.7.218 Date: Sun, 10 Aug 2008 19:10:59 -0700 (PDT) From: Sameer Acharya Reply-To: acharya_sam@yahoo.com Subject: Re: Possible virus uploaded to Tomcat 5.5.3 - SOLVED To: Tomcat Users List In-Reply-To: <489F2F73.80602@apache.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Message-ID: <63788.81203.qm@web52408.mail.re2.yahoo.com> X-Virus-Checked: Checked by ClamAV on apache.org Just a couple of questions on this. 1. I read your mail exchange and it seems that the OP has mentioned no Manager app was installed, but your analysis indicates that the rogue app was uploaded through manager app ?. 2. Normally firewalls keep a log of port activity so was this activity not detected by the firewall ? -Sameer --- On Sun, 8/10/08, Mark Thomas wrote: > From: Mark Thomas > Subject: Re: Possible virus uploaded to Tomcat 5.5.3 - SOLVED > To: "Tomcat Users List" > Date: Sunday, August 10, 2008, 11:42 PM > Folks, > > Just a short note to let you know that Warren and I have > been working this > off-list and have identified how this attack was launched. > > I'd like to take this opportunity to publicly thank > Warren for taking the > time to work with me on this when he had a lot more > important things to do > than answer my questions. > > The manager application was installed with a user name and > password that > the attackers were able to brute force. Once they had > access to the manager > application they were able to install their own web > application that > allowed them wider access to the box. > > This isn't the first report of a rouge application that > we have seen on the > Tomcat security list. Where we have had sufficient detail > to trace how the > application was installed, it has always been via an > existing management tool. > > Therefore, I would like to take the opportunity to remind > users to ensure > that any potentially user accessible administration > interface is suitably > secured. The following isn't an exhaustive list but > things to consider include: > - don't use and standard user names for administrative > users > - do use strong passwords, especially for administrative > users > - uninstall web applications you don't need (admin, > manager, host-manager, > examples, webdav, etc) > - use Remote Host/Address filters to limit access to > administrative > applications > - enable access logging so if something does go wrong you > have some > information to work with > - regularly review your access logs for evidence of > potential attacks > - run Tomcat as a dedicated user with the minimum > privileges possible > > Finally, a small advert. I am presenting a session on > Tomcat security at > ApacheCon in November that will cover the above and a whole > lot more. > > Mark > > > --------------------------------------------------------------------- > To start a new topic, e-mail: users@tomcat.apache.org > To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org > For additional commands, e-mail: > users-help@tomcat.apache.org --------------------------------------------------------------------- To start a new topic, e-mail: users@tomcat.apache.org To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org For additional commands, e-mail: users-help@tomcat.apache.org