We have found the malware installed on the tomcat version
6.0.29 on two of the servers.The both servers have a war file
(Tomcatmanagxesaxsas.war) that installed several java script files to the
Tomcat webserver that allow for remote access over the web. OD-VA-W-AG-87 had
an additional war file (Jeroy.war) that appears to also be a java script remote
file browser. Even though , we followed all the security settings needed for
the tomcat container.

 

The below steps are followed to secure the tomcat container:

 

1) Removed the default examples under CATALINA_HOME/webapps
like jsp-examples, servlet-examples, tomcat-docs, webdav

2) Make sure the default servlet is configured not to server
index pages when a welcome file is not present. In CATALINA_HOME/conf/web.xml

<init-param>

    
<param-name>listings</param-name>

    
<param-value>false</param-value>  <!-- make sure this is false -->

   </init-param>

 

3) Context.xml :

HttpOnly configuration : Tomcat versions support the
HttpOnly [1] cookie option.

This is configured in the conf/context.xml file: 

<Context useHttpOnly="true">

 

4) server.xml :

In the server.xml for all the connector , we have added
secure="true"

 

5) Make sure all the 
sample user and role entries are commented out in the
CATALINA_HOME/conf/tomcat-users.xml file

 

 

Let us know if anything missing as part of security settings

 

Thanks,Mohan


Reply via email to