Skip to main content
ExLibris
  • Subscribe by RSS
  • ExLibris Dev

    DigiTool JBoss Vulnerability

    • Article Type: General
    • Product: DigiTool
    • Product Version: 3

    Description:
    After finding evidence of port scanning from Ex Libris services, we identified the cause was a worm (a form of malware) that uses a JBoss vulnerability to scan ports and create processes on the server, which may create a system load and is of course a security hazard. The vulnerability only exists for customers using port 80 or 8080, but a future generation of such a worm may infect those using other ports as well.

    We have not found any DigiTool customers infected by this worm to date, but we are making this announcement as a precaution to explain how to protect DigiTool. We strongly recommend that you apply the fix.

    Attack Details & Fix Instructions

    A worm is exploiting a security exposure in the JBoss jmx-console installed on the DigiTool server. Using an HTTP HEAD request the worm bypasses the existing exposure mitigation and installs the web application zecmd (or iesvc). This application allows for the execution of arbitrary commands as the dtl user. Using zecmd or iesvc, the worm downloads and extracts a package and starts a copy of the worm.

    The worm is a Perl script that masks itself as another process. It first starts another Perl script, an IRC server, that also masks itself as another process. The worm then compiles a port scanner and begins scanning a random Class B subnet of IP addresses looking for JBoss servers on some set of ports. For every JBoss server found it attempts to propagate itself as described above.

    Resolution:
    To prevent infection, the jmx-console web application must be un-deployed. This is accomplished by moving jmx-console.war out of the DigiTool JBoss deployment directory (/exlibris/dtl/j3_x/digitool/home/system/thirdparty/openserver/server/default/deploy). The zecmd (or iesvc) web application, if installed, can be found in the management sub-directory (/exlibris/dtl/j3_x/digitool/home/system/thirdparty/openserver/server/default/deploy/management) and should be deleted. If infected, the processes mentioned above (the worm, the IRC server, and the port scanner) should be killed. Finally the JBoss bin directory (/exlibris/dtl/j3_x/digitool/home/system/thirdparty/openserver/bin), needs to be cleaned up. All worm packages should be removed, as well as any file they extracted.

    Customers may use these to prevent and/or remove an infection. We have also created a script to address this issue by making the changes outlined above. The script is attached to this KB Item as jmx297360.zip. Download this zip file to your DigiTool server, unzip, and execute the file inside with the command, "ksh jmx297360.ksh", as the root user. It will log its activity to the screen and to the file /exlibris/dtl/j3_x/digitool/home/system/thirdparty/openserver/server/default/log/jmx297360.log You may contact Support if you need any assistance.

    We have seen the following variations of this worm:
    kisses.tar.gz (v1)
    Scans port 80
    Masks itself as
    /usr/local/jboss/bin/tomcat
    /usr/local/apache/bin/httpd –DSSL
    Port Scanner: pnscan
    kisses.tar.gz (v2)
    Scans ports 80 & 8080
    Masks itself as
    /usr/local/jboss/bin/tomcat
    /usr/local/apache/bin/httpd –DSSL
    Port Scanner: pnscan


    • Article last edited: 10/8/2013
    //doorbell.io feedback widged