nuclei-templates/http/misconfiguration/jolokia/jolokia-list.yaml

33 lines
865 B
YAML

id: jolokia-list
info:
name: Jolokia - List
author: pussycat0x
severity: low
description: Jolokia listing enabled.
reference:
- https://thinkloveshare.com/hacking/ssrf_to_rce_with_jolokia_and_mbeans/
- https://github.com/laluka/jolokia-exploitation-toolkit
metadata:
max-request: 2
tags: jolokia,springboot,tomcat,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/jolokia/list"
- "{{BaseURL}}/actuator/jolokia/list"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- '"type":"list"'
# digest: 4a0a0047304502207d86bf9ec3063802f522232ef6f6e01bd19d004bea9e781525e09a880ecadc96022100ac32cdd199bf84d21bf6e7aa71479e3e1e0c25b63e9e249758de6e49d2f43cb5:922c64590222798bb761d5b6d8e72950