Service:
http-alt
Protocol:
TCPPort:
8181Used for:
Alternative HTTP port for web applicationsWhy It’s Open
Port 8181 is commonly used by Oracle GlassFish application server for administrative access and HTTP alternative services. GlassFish provides a web-based management console for deploying and configuring Java Enterprise Edition (JEE) applications. This port is also used by various other web applications as an alternative to standard HTTP ports.
Common Risks
- Default administrative credentials
GlassFish often deployed with unchanged default passwords - Administrative console exposure
Management interfaces accessible without proper authentication - Application deployment vulnerabilities
Malicious applications can be deployed through admin console - Information disclosure
Server details and application structure exposed - SSL/TLS misconfigurations
Weak encryption settings exposing sensitive data - Directory traversal attacks
Path manipulation to access restricted files - Remote code execution
Exploitation through application server vulnerabilities
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Service Detection:
nmap -sV -p 8181Admin Console Access:
curl -k https://:8181/common/index.jsfAuthentication Testing:
curl -u admin:admin http://:8181/management/domainWhat to Look For
| Checkpoint | What it means |
|---|---|
| Service version | Identify software version and patch level |
| Authentication | Check for default or weak credentials |
| SSL/TLS config | Verify encryption settings if applicable |
| Access controls | Test for proper authorization mechanisms |
Mitigation
- Keep software updated
Apply latest security patches - Strong authentication
Use complex passwords and 2FA - Access restrictions
Limit service to trusted networks - Monitor activity
Log and review service usage - Disable if unused
Remove unnecessary services
TL;DR
- Port 8181 = HTTP Alternative service
- Protocol: TCP
- Used for: GlassFish application server administration and Java enterprise applications
- Security focus: Java enterprise application security and GlassFish hardening
Known CVEs and Exploits
- CVE‑2017‑1000028 – Oracle GlassFish Server directory traversal vulnerability
- GlassFish Default Credentials – Common deployment with weak administrative passwords
- Java Enterprise Application Vulnerabilities – Web applications often deployed with security misconfigurations
- Management Interface Exposure – Administrative consoles exposed without proper authentication