There are increasing reports starting in July of 2008 and rising through August 
and September of an active exploit involving the default credentials for the 
tomcat manager app (not version specific). 

I am writing to suggest the the tomcat devs take some simple steps to help 
prevent novice users from becoming targets.  More below...

I have encountered the malware in late September 2008.  Here is what I have 
found:

1)  There are several variants such as: fexcep.war OR fexcepkillshell.war OR 
fexcepshell.war OR fexcepspshell.war OR fexception.war OR fexshell.war OR 
fexsshell.war

2)  It appears to be distributed using an automated scanner that looks for the 
manager app running on Tomcat port 8080 with the default password still intact: 
admin / admin.  We were exploited on multiple live servers across different 
subnets, indicating active scanning for vulnerable hosts is occurring.

3)  The code uploads and deploys a webapp to Tomcat through the manager app 
that:
a)  Checks if the OS is windows.  If not it terminates.
b)  If it is windows... then some variants immediately download and execute a 
binary from one of several possible servers.  The binary presumably contains 
further malware.
c)  Other variants apparently wait to be invoked again by an external host that 
will provide the URL of a binary to download and execute.

I have found posts on several mailing lists of user who are infected by this 
and are unaware of how it was installed. 

Given the widespread and increasing nature of this exploit, I think it would be 
prudent of the tomcat devs to alter the default installation to disable the 
tomcat manager by default or otherwise somehow require a non-default password 
to be set.  True, this is not a bug of Tomcat, but it would help protect users 
if the default behavior prevented the inadvertent opening of this backdoor 
entry point.

Best Regards.


      

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to