Submit a ticketCall us

Get a crash course on Network Monitoring delivered right to your inbox
This free 7-day email course provides a primer to the philosophy, theory, and fundamental concepts involved in IT monitoring. Lessons will explain not only how to perform various monitoring tasks, but why and when you should use them. Sign up now.

Home > Success Center > Web Help Desk (WHD) > JMX-RMI vulnerability

JMX-RMI vulnerability

Table of contents

Overview

The following article provides an example of how the Java Management Extensions/Java Remote Method Invocation (JMX/RMI) vulnerability can impact Java-based applications:

Vulnerability and Exploit Database

Environment

  • VMware® virtual appliances
  • All WHD versions

Detail

It was discovered that VMware vCenter® binds an unauthenticated JMX/RMI service to the network stack, allowing an attacker to achieve remote code execution and provide SYSTEM-level access to its hosts.

Web Help Desk is safe. The JMX Vulnerability does not apply to Web Help Desk.

If you choose to disable local access to the JMX agent, perform the following steps:

  1. Log in to the appliance as an administrator.
  2. Navigate to:
    usr\local\webhelpdesk\conf\
  3. Open the whd.conf file using a text editor (such as Notepad).
  4. Scroll down to the JAVA_OPTS section and add the following parameters:
    JAVA_OPTS="-XX:+DisableAttachMechanism -Dsun.rmi.transport.tcp.maxConnectionThreads=0"
  5. Save and close the file.
  6. Restart Web Help Desk to enable the changes. 

 

Last modified
08:12, 10 Aug 2017

Tags

Classifications

Public