nuclei-templates/security-misconfiguration/springboot-detect.yaml

57 lines
1.5 KiB
YAML
Raw Normal View History

id: springboot-actuators
info:
name: Detect the exposure of Springboot Actuators
author: that_juan_
severity: medium
requests:
- method: GET
path:
- "{{BaseURL}}/trace"
- "{{BaseURL}}/loggers"
- "{{BaseURL}}/autoconfig"
- "{{BaseURL}}/threaddump"
- "{{BaseURL}}/env"
- "{{BaseURL}}/management"
- "{{BaseURL}}/dump"
- "{{BaseURL}}/configprops"
- "{{BaseURL}}/mappings"
- "{{BaseURL}}/auditevents"
- "{{BaseURL}}/beans"
- "{{BaseURL}}/cloudfoundryapplication"
2020-04-15 20:05:33 +00:00
- "{{BaseURL}}//jolokia"
- "{{BaseURL}}/actuator"
- "{{BaseURL}}/actuator/auditevents"
- "{{BaseURL}}/actuator/beans"
2020-04-14 15:32:51 +00:00
- "{{BaseURL}}/actuator/health"
- "{{BaseURL}}/actuator/conditions"
- "{{BaseURL}}/actuator/configprops"
- "{{BaseURL}}/actuator/env"
2020-04-14 15:32:51 +00:00
- "{{BaseURL}}/actuator/dump"
- "{{BaseURL}}/actuator/threaddump"
- "{{BaseURL}}/actuator/flyway"
- "{{BaseURL}}/actuator/integrationgraph"
- "{{BaseURL}}//actuator/management"
2020-04-15 20:12:21 +00:00
- "{{BaseURL}}//actuator/jolokia"
matchers:
2020-04-14 15:32:51 +00:00
- type: regex
part: body
regex:
2020-05-25 08:13:15 +00:00
- "method"
- "spring"
- "TYPE"
- "system"
- "database"
- "cron"
condition: or
- type: status
status:
- 200
- type: word
words:
2020-05-25 08:13:15 +00:00
- "application/json"
- "hprof"
condition: or
part: header