nuclei-templates/http/misconfiguration/springboot/springboot-loggers.yaml

40 lines
1002 B
YAML
Raw Normal View History

2021-01-28 17:43:50 +00:00
id: springboot-loggers
2021-01-28 15:56:38 +00:00
info:
name: Detect Springboot Loggers
2021-06-09 12:20:56 +00:00
author: that_juan_,dwisiswant0,wdahlenb
2021-01-28 15:56:38 +00:00
severity: low
2024-01-03 06:08:41 +00:00
description: Springboot Loggers is exposed.
metadata:
max-request: 2
2023-10-14 11:27:55 +00:00
tags: springboot,exposure,misconfig
2021-01-28 15:56:38 +00:00
http:
2021-01-28 15:56:38 +00:00
- method: GET
path:
- "{{BaseURL}}/loggers"
- "{{BaseURL}}/actuator/loggers"
2022-07-28 08:35:37 +00:00
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
2021-01-28 15:56:38 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"loggers"'
2021-04-28 10:20:24 +00:00
- '"levels"'
condition: and
2021-01-28 15:56:38 +00:00
- type: word
2022-07-28 08:35:37 +00:00
part: header
2021-01-28 15:56:38 +00:00
words:
- "application/json"
- "application/vnd.spring-boot.actuator"
- "application/vnd.spring-boot.actuator.v1+json"
condition: or
2022-07-28 08:35:37 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100ca166f64f52ded412b61ec006959c4e06b7235418ae58e6ccb5ba3d2827b213702203bd2f3815c1886bce98455368332855df0e66fc6d583585510e3ecc175abae9b:922c64590222798bb761d5b6d8e72950