Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations dencom on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Tomcat vulnerability

Status
Not open for further replies.

Onorio

Technical User
Jun 5, 2015
49
NO
Hi,

Server Edition is using the default Tomcat user/password, so in generate a huge vulnerability because I can access with this user/password to tomcat and make changes so anybody could do it.
Do you know if I can change the default password without affecting Avaya applications?
I don't understand how Avaya left this user by default.
Thanks
 
For which access method is tomcat's password default?
For bash, wouldn't tomcat, in /etc/passwd, have something like /sbin/nologon - like service users such as postgres, thereby making shell access impossible?
 
I wouldn't be surprised if they overlooked it, but considering how many people have their system passwords at default, I think the stock answer is to firewall that stuff off
 
Yes, but I was thinking in a internal attack, not from the outside.
With this hole anybody in the LAN can access to this Tomcat management and make some changes.
I need to avoid it.
 
Well hopefully you've told Avaya rather than just blurting it out in public.

Stuck in a never ending cycle of file copying.
 
I'm unable to duplicate this. Seems default password don't work on mine.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top