nuclei-templates/http/misconfiguration/springboot/springboot-heapdump.yaml

52 lines
1.6 KiB
YAML
Raw Normal View History

2021-01-28 17:43:50 +00:00
id: springboot-heapdump
info:
name: Spring Boot Actuator - Heap Dump Detection
2021-06-09 12:20:56 +00:00
author: that_juan_,dwisiswant0,wdahlenb
severity: critical
2023-06-06 05:17:44 +00:00
description: |
A Spring Boot Actuator heap dump was detected. A heap dump is a snapshot of JVM memory, which could expose environment variables and HTTP requests.
reference:
- https://github.com/pyn3rd/Spring-Boot-Vulnerability
metadata:
2023-05-29 16:38:21 +00:00
max-request: 3
tags: springboot,exposure,misconfig
2023-05-29 16:38:21 +00:00
variables:
str: "{{rand_base(6)}}"
http:
2023-05-29 16:38:21 +00:00
- raw:
- |
GET /{{str}} HTTP/1.1
Host: {{Hostname}}
- |
GET /heapdump HTTP/1.1
Host: {{Hostname}}
- |
GET /actuator/heapdump HTTP/1.1
Host: {{Hostname}}
max-size: 2097152 # 2MB - Max Size to read from server response
2023-10-14 11:27:55 +00:00
2023-05-30 01:03:13 +00:00
matchers-condition: or
matchers:
2023-05-29 16:38:21 +00:00
- type: dsl
dsl:
2023-05-30 01:03:13 +00:00
- "!contains(hex_encode(body_1), '1f8b080000000000')"
- "contains(hex_encode(body_2), '1f8b080000000000')"
2023-06-06 05:24:25 +00:00
condition: and
2021-08-06 15:32:50 +00:00
2023-05-30 01:03:13 +00:00
- type: dsl
dsl:
- "!contains(hex_encode(body_1), '1f8b080000000000')"
- "contains(hex_encode(body_3), '1f8b080000000000')"
2023-06-06 05:24:25 +00:00
condition: and
2023-05-29 07:13:15 +00:00
2023-05-29 16:38:21 +00:00
- type: dsl
dsl:
2023-06-06 05:17:44 +00:00
- "contains(hex_encode(body_2), '4a4156412050524f46494c45') || contains(hex_encode(body_2), '4850524f46')"
- "contains(hex_encode(body_3), '4a4156412050524f46494c45') || contains(hex_encode(body_3), '4850524f46')"
2023-06-06 05:24:25 +00:00
condition: or
# digest: 4b0a0048304602210090329c9d05188b4f4a2a1be77fcdce53e8950ab5ab7fcf6cbcf8cb529b3853e2022100dfb3edfe1402c4a3413780785a2083bbe03fb7df08cbc7d2755eaf45dd049a8e:922c64590222798bb761d5b6d8e72950