Nothing new, notes for later, actually got most of the info from:
http://www.notsosecure.com/folder2/2009/10/27/hacking-jboss-with-jmx-console/
http://goohackle.com/jboss-security-vulnerability-jmx-management-console/
http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf
The pdf (last link) actually details all the steps to get it done.
Google Dorks
intitle:”jboss management console” “application server” version inurl:”web-console”
intitle:”JBoss Management Console – Server Information” “application server” inurl:”web-console” OR inurl:”jmx-console”
Those searches will lead you to
http://somecrappysite.com/web-console/ServerInfo.jsp
will all kinds of fun information like below:
switch the URL to
http://somecrappysite.com/jmx-console/
and you'll either be greeted with a password prompt box (good) or the JMX Console page (not good--least for them)
http://www.notsosecure.com/folder2/2009/10/27/hacking-jboss-with-jmx-console/
http://goohackle.com/jboss-security-vulnerability-jmx-management-console/
http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf
The pdf (last link) actually details all the steps to get it done.
Google Dorks
intitle:”jboss management console” “application server” version inurl:”web-console”
intitle:”JBoss Management Console – Server Information” “application server” inurl:”web-console” OR inurl:”jmx-console”
Those searches will lead you to
http://somecrappysite.com/web-console/ServerInfo.jsp
will all kinds of fun information like below:
switch the URL to
http://somecrappysite.com/jmx-console/
and you'll either be greeted with a password prompt box (good) or the JMX Console page (not good--least for them)