2021-02-24 06:35:37 +00:00
id : java-melody-exposed
info :
name : JavaMelody Monitoring Exposed
2021-06-09 12:20:56 +00:00
author : dhiyaneshDK,thomas_from_offensity
2021-02-24 17:25:41 +00:00
severity : medium
2023-10-14 11:27:55 +00:00
description : JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to "View http sessions". This can be used by an attacker to steal a user's session.
2021-08-18 11:37:49 +00:00
reference :
2021-04-14 16:15:35 +00:00
- https://www.acunetix.com/vulnerabilities/web/javamelody-publicly-accessible/
- https://github.com/javamelody/javamelody/wiki/UserGuide#16-security
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-10-14 11:27:55 +00:00
tags : config,java,javamelody,misconfig
2021-02-24 06:35:37 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-02-24 06:35:37 +00:00
- method : GET
path :
- '{{BaseURL}}/monitoring'
- '{{BaseURL}}/..%3B/monitoring'
2021-02-24 17:25:41 +00:00
matchers-condition : and
2021-02-24 06:35:37 +00:00
matchers :
- type : word
words :
- 'Monitoring JavaMelody on'
2023-10-14 11:27:55 +00:00
2021-02-24 17:25:41 +00:00
- type : status
status :
2021-04-14 16:15:35 +00:00
- 200
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022100af8ed34b09cb13fba82f8e0bdf99c29ede3e7d009deaa24c9692e17c97aecf720220320f32c3b9aa9f06c31222e728c7a66813e6d8ba302f2c77977e0cc45a93b2f5:922c64590222798bb761d5b6d8e72950