nuclei-templates/http/misconfiguration/springboot/springboot-heapdump.yaml

52 lines
1.6 KiB
YAML

id: springboot-heapdump
info:
name: Spring Boot Actuator - Heap Dump Detection
author: that_juan_,dwisiswant0,wdahlenb
severity: critical
description: |
A Spring Boot Actuator heap dump was detected. A heap dump is a snapshot of JVM memory, which could expose environment variables and HTTP requests.
reference:
- https://github.com/pyn3rd/Spring-Boot-Vulnerability
metadata:
max-request: 3
tags: springboot,exposure,misconfig
variables:
str: "{{rand_base(6)}}"
http:
- raw:
- |
GET /{{str}} HTTP/1.1
Host: {{Hostname}}
- |
GET /heapdump HTTP/1.1
Host: {{Hostname}}
- |
GET /actuator/heapdump HTTP/1.1
Host: {{Hostname}}
max-size: 2097152 # 2MB - Max Size to read from server response
matchers-condition: or
matchers:
- type: dsl
dsl:
- "!contains(hex_encode(body_1), '1f8b080000000000')"
- "contains(hex_encode(body_2), '1f8b080000000000')"
condition: and
- type: dsl
dsl:
- "!contains(hex_encode(body_1), '1f8b080000000000')"
- "contains(hex_encode(body_3), '1f8b080000000000')"
condition: and
- type: dsl
dsl:
- "contains(hex_encode(body_2), '4a4156412050524f46494c45') || contains(hex_encode(body_2), '4850524f46')"
- "contains(hex_encode(body_3), '4a4156412050524f46494c45') || contains(hex_encode(body_3), '4850524f46')"
condition: or
# digest: 4b0a0048304602210090329c9d05188b4f4a2a1be77fcdce53e8950ab5ab7fcf6cbcf8cb529b3853e2022100dfb3edfe1402c4a3413780785a2083bbe03fb7df08cbc7d2755eaf45dd049a8e:922c64590222798bb761d5b6d8e72950