id: springboot-jolokia info: name: Detects Springboot Jolokia Actuator author: DhiyaneshDK severity: low description: Springboot Jolokia Actuator is exposed. reference: - https://raw.githubusercontent.com/maurosoria/dirsearch/master/db/dicc.txt metadata: verified: true max-request: 2 shodan-query: title:"Eureka" tags: misconfig,springboot,exposure http: - method: GET path: - "{{BaseURL}}/jolokia" - "{{BaseURL}}/actuator/jolokia" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - '"config":{' - '"agentId":"' condition: and - type: word part: header words: - "application/json" - "application/vnd.spring-boot.actuator" - "application/vnd.spring-boot.actuator.v1+json" - "application/vnd.spring-boot.actuator.v2+json" - "application/vnd.spring-boot.actuator.v3+json" - "text/plain" condition: or - type: status status: - 200 # digest: 490a0046304402203339943701d7d9687214af27542d7f9a1cc1a4c7930d7614237ca196b5b28464022050ba9ca3466dbd98e2139613f4d32ef94daaabcb002ad8a20e114ffbce81f5f4:922c64590222798bb761d5b6d8e72950