32 lines
1.1 KiB
YAML
32 lines
1.1 KiB
YAML
id: java-melody-exposed
|
|
|
|
info:
|
|
name: JavaMelody Monitoring Exposed
|
|
author: dhiyaneshDK,thomas_from_offensity
|
|
severity: medium
|
|
description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to "View http sessions". This can be used by an attacker to steal a user's session.
|
|
reference:
|
|
- https://www.acunetix.com/vulnerabilities/web/javamelody-publicly-accessible/
|
|
- https://github.com/javamelody/javamelody/wiki/UserGuide#16-security
|
|
metadata:
|
|
max-request: 2
|
|
tags: config,java,javamelody,misconfig
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/monitoring'
|
|
- '{{BaseURL}}/..%3B/monitoring'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- 'Monitoring JavaMelody on'
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
# digest: 4a0a00473045022100af8ed34b09cb13fba82f8e0bdf99c29ede3e7d009deaa24c9692e17c97aecf720220320f32c3b9aa9f06c31222e728c7a66813e6d8ba302f2c77977e0cc45a93b2f5:922c64590222798bb761d5b6d8e72950
|