tomcat-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Christopher Schultz <>
Subject Re: tomcat manager with weak password compromised. Any idea about the payload?
Date Thu, 12 Apr 2012 16:27:37 GMT
Hash: SHA1


On 4/11/12 10:40 PM, Tom H wrote:
> An instance running tomcat 6.0.24 as root

Obviously, you won't make that mistake again.

Was the manager app available to non-localhost clients?

> in our developer network was compromised today by a scanning bot 
> which deployed a war file and then deleted the on disk file,
> before scanning for new hosts until the IDS detected it.


> Obviously this is not a flaw in tomcat, but I was hoping someone
> could give me some pointers to where I might read a write-up of the
> payload, as I would be interested to know to what extent the bot
> took advantage of its root power.

Are you looking for a copy of the uploaded WAR file? If it was
deleted, then your only option is to track-down the deleted inode and
snoop the bits on the disk. I don't believe the manager performs any
auditing of the uploaded WAR files.

> The proc with all the connections was actually perl, and runnings 
> strings on a core  dump of that process reveals many perl stuff.
> (and also the very weak password list)
> However googling these facts does not seem to be helping that much,
> any suggestions?

So you have the Perl script itself? Or, it's still running but not
available on the disk? Perl compiles scripts as it runs them, so you
may not be able to get the full-text of the script without some kind
of Perl-oriented forensic decompilation tool.

Sorry you got pwned. If you discover anything about the bot, let us
know. Maybe there's something we can do to help thwart future attacks
(though not running as root and not allowing non-localhost connections
are certainly reasonable things that can already be done).

- -chris
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools -
Comment: Using GnuPG with Mozilla -


To unsubscribe, e-mail:
For additional commands, e-mail:

View raw message