New JBOSS Worm Infecting Unpatched Servers 47
Trailrunner7 writes "There is a new worm circulating right now that is compromising servers running older versions of the JBoss Application Server and then adding them to a botnet. The worm also attempts to install a remote access tool in order to give the attacker control over the newly infected server. The worm has been circulating for a couple of days at least, and it's not clear right now how many servers have been compromised or what the origins of it are. It apparently exploits an old vulnerability in the JBoss Application Server, which was patched in April 2010, in order to compromise new machines. Once that's accomplished, the worm begins a post-infection routine that includes a number of different steps."
15 minutes (Score:3)
Clearly all the Slashdot commenters are busy patching their bosses' JBoss servers against this vulnerability.
Re: (Score:2)
Or more likely, they're contacting their software vendors to yell and scream until the vendor finally gets off their ass and agrees to provide a supported product update to fix the problem.
Re: (Score:1)
Big, unnamed, telecoms.
Patch available -- don't panic (Score:2)
Just point the fingers at the sysadmins who haven't been keeping up with patches on their production systems. Alas, all too common an issue.
However, I would like to point the finger at Oracle for releasing updates to Glassfish without a lock-step update of the Eclipse GlassFish tools. I can not upgrade my dev servers without the updates to the dev tools. I don't like being forced to develop and test downlevel from production.
Re: (Score:2, Interesting)
Or how about blaming the Business user for rewarding the vendor by going out and purchasing said shitty software, failing to involve IT at any point in the process, signing the contract, and then (and ONLY then) telling the sysadmin, "Hey, here's the new WhizzBang 2000 software that I just unilaterally purchased and
Re: (Score:1)
https://access.redhat.com/kb/docs/DOC-30741 [redhat.com]
Cheers.
Re: (Score:2)
Yeah, yeah, it's not all the sysadmins fault. Compatability issues and all that. But at least in theory, you're supposed be able to deploy a web application in any container/server, so if you can't apply the updates in this case, there's something fundamentally wrong.
Re: (Score:2)
indeed, and running core business production server on the unsupported community edition is almost as bad !
Re: (Score:1)
Re: (Score:2)
I know open source software doesn't require a license, but morally anyone who deploys open source software should be helping to support the community that does the development and maintenance. Some businesses invest a significant portion of their support fees into maintaining the software that's shared by the community. They deserve to be supported in their efforts -- and if no one supports those efforts, who is going to do the work?
Sometimes it's easy to pinpoint a maintainer or provider to support, s
Re: (Score:2)
Programmers gotta eat, too.
So Cheetos and Mountain Dew? Granted, that won't pay for their health care costs once they get sick,, but there's always some kid out of college to replace them.
Re: (Score:3)
Obviously you've never worked with enterprise applications. You run off and start applying patches/updates on your own without vendor blessings (likely invalidating support contracts that cost more than your annual salary), you can (probably should) get fired. It's all fun and games cowboying your way through updates and talking about how it should all just work (in theory) right up until you break some obscure, shitty vendor code and cause a major outage, blow through the SLA, and risk the loss of a multi-
Re: (Score:2)
That's rich. 20+ years experience doesn't count?
If you have a vendor coordinating your patches, you've outsourced the patching to them. In that case, they're the lazy sysadmins I'm talking about because they've taken on responsibility for doing the patching and testing. Clearly your vendor is not delivering on their end of the bargain if they're not actually keeping you up to date.
The compatability argument is a red herring with properly des
Re: (Score:3)
In a world of web services and modular software where everything is constantly changing, how can you continue to be so naive as to think you can put a stake in the ground and say "thou shalt be production"? What's the point of dynamically loaded modules on a JEE server (for example), if you can't install the updates for the individual modules?
Re: (Score:2)
If the vendor only supports Java/Weblogic/Apache 1.2.3 for their product, you don't get to install 1.2.4 until they support it. If you just decide to do it anyway, the best case scenario is they tell you they don't know the next time you come to them with a problem. The worse case scenario is they run your support agreement through a shredder and laugh at you.
Admins don't decide which versions of underlying software are supported; the vendor does.
Admins don't decide which vendor's software to use; the custo
Re: (Score:2)
Key point: "For a given point release."
If you're paying for support, the provider should be back-porting security fixes to earlier point releases as well. The "upgrade to fix" mentality from vendors is as bad as the "lock it down" production release.
I understand the arguments for the "lock it down" model. I really do. I've heard them all my life. I just feel it's fundamentally the wrong approach.
Third party vendors should be held responsible for keeping up to date as well. People and companies w
Occupy! (Score:2)
Don't give up hope on holding big business accountable.
Re: (Score:2)
More to the point, this can be avoided by correctly securing your jmx-console application on JBoss. The jmx-console allows arbitrary code to be executed with the permissions of the application server. The worm itself targets older versions of JBoss (of which there are a number of production installations), but could theoretically target newer servers as well. It's just that the worm hasn't been updated for the newer jmx-console, which I believe still allows the arbitrary code execution. It is, after all, an
Re: (Score:3)
It's a bit worse than that. The article, and exploit, refers to the enterprise platform, but community editions are also vulnerable - and many people run the non-Redhat paid versions for a variety of reasons (not just businesses trying to be cheap). The only supported community release is JBoss 7 and the console works differently there.
In 4.0.x the console was unsecured - fine, this is no longer a supported Enterprise platform.
In 4.2.x onwards, the console shipped secured to a degree. The vulnerability is i
Re: (Score:3)
"Just point the fingers at the sysadmins who haven't been keeping up with patches on their production systems"
Sysadmins? They really have usually the power to decide on an upgrade when...
* It's a supported version and the vendor doesn't provide an upgrade?
* The app server is used to host a supported program that will break support if you don't stay at the version they say?
* It's an in-house app and the developers still are using -and depending on, the unpatched version and don't give a damn?
* His manager i
Not much of a vulnerability (Score:2)
This isn't new (Score:2)
intitle:”jboss management console” “application server” version inurl:”web-console”
intitle:”JBoss Management Console – Server Information” “application server” inurl:”web-console” OR inurl:”jmx-console”
As I said above, this isn't new.
you face facts, (Score:1)
JBoss (Score:4, Funny)
New UNNECESSARY CAPITALIZATION Worm Infecting Unpatched Headlines
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
These questions are answered in the Tomcat Connectors FAQ [apache.org].
Re: your sig. You will find people withhold less information when you take the time to do research before asking FAQs. Paying them helps too ;-)
Where to find info on How to protect your Jboss (Score:1)
Re: (Score:1)
If your system has been compromised, there is no 'fixing' it. Anyone who claims otherwise is a fool or a troll. Restore/rebuild with a known-good configuration, then secure that. The problem with trying to 'fix' JBOSS after an attacker has gained access is that you don't know what else they've gotten into on that system. Worst case scenario is that they're a lot better than you and have stuff hidden all over the place that you'll never find. You patch your JBOSS issue and move along believing all is well. M