lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100615125830.GH25701@otis>
Date: Tue, 15 Jun 2010 14:58:30 +0200
From: RedTeam Pentesting GmbH <release@...team-pentesting.de>
To: full-disclosure@...ts.grok.org.uk
Subject: Whitepaper: JBoss AS - Deploying WARs with the
 DeploymentFileRepository MBean

RedTeam Pentesting released a new JBoss security whitepaper with the title
"JBoss Application Server - Deploying WARs with the DeploymentFileRepository
MBean". It explains how to deploy WAR files with the DeploymentFileRepository
MBean and how this is even possible with Cross Site Request Forgery (CSRF). The
paper is available at

http://www.redteam-pentesting.de/publications/jboss

This new informational page also contains the now publicly released scripts used
in the older paper "Bridging the Gap between the Enterprise and You - or - Who's
the JBoss now?".

Abstract
--------
The JBoss Application Server (JBoss AS) is a widely used, open source Java
application server. It is part of the JBoss Enterprise Middleware Suite (JEMS)
and often used in large enterprise installations. Because of the high modularity
and versatility of this software solution, which leads to a high complexity, the
JBoss AS is a rewarding target for attackers in enterprise networks. This paper
adds to the whitepaper "Bridging the Gap between the Enterprise and You - or -
Who's the JBoss now?" released by RedTeam Pentesting.  It shows how to use the
DeploymentFileRepository MBean to deploy a Web ARchive (WAR) without the need of
outbound connections being allowed for the JBoss AS. It also describes how this
can be used in conjunction with CSRF to attack a JBoss AS with a protected JMX
Console.

-- 
RedTeam Pentesting GmbH                    Tel.: +49 241 963-1300
Dennewartstr. 25-27                        Fax : +49 241 963-1304
52068 Aachen                    http://www.redteam-pentesting.de/
Germany                         Registergericht: Aachen HRB 14004
Geschäftsführer: Patrick Hof, Jens Liebchen, Claus R. F. Overbeck

Content of type "application/pgp-signature" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ