id: jolokia-logback-jndi-rce info: name: Jolokia Logback JNDI - Remote Code Execution author: SleepingBag945 severity: high description: Jolokia Logback is vulnerable to RCE. reference: - https://thinkloveshare.com/hacking/ssrf_to_rce_with_jolokia_and_mbeans/ - https://github.com/laluka/jolokia-exploitation-toolkit - https://github.com/LandGrey/SpringBootVulExploit#0x04jolokia-logback-jndi-rce metadata: max-request: 2 tags: jolokia,springboot,tomcat,rce http: - method: GET path: - "{{BaseURL}}/jolokia/list" - "{{BaseURL}}/actuator/jolokia/list" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - 'ch.qos.logback.classic.jmx.JMXConfigurator' - 'reloadByURL' condition: and - type: status status: - 200 # digest: 4a0a0047304502201b65a729a7254acffb139152af6b7cc3691b9f0b054c909da6ba5267b1988b16022100ce57f1a607c1730bf707585c2f72336fa95cacc093806bef84eb8fe15c6b11a8:922c64590222798bb761d5b6d8e72950