nuclei-templates/http/misconfiguration/springboot/springboot-trace.yaml

43 lines
1.1 KiB
YAML

id: springboot-trace
info:
name: Detect Springboot Trace Actuator
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: View recent HTTP requests and responses
metadata:
max-request: 1
tags: misconfig,springboot,exposure
http:
- method: GET
path:
- "{{BaseURL}}/trace"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"timestamp"'
- '"info"'
- '"method"'
- '"path"'
condition: and
- type: word
part: header
words:
- "application/json"
- "application/vnd.spring-boot.actuator"
- "application/vnd.spring-boot.actuator.v1+json"
- "application/vnd.spring-boot.actuator.v2+json"
- "application/vnd.spring-boot.actuator.v3+json"
condition: or
- type: status
status:
- 200
# digest: 4a0a0047304502206b91f3290123e1c4d562570b2b0ef963c6922d06eaf442edb1384481ddaf827f022100f2b9812f280867139938c668010e45e7993ac1fb12bdda711eb6f4e3ca82d9cb:922c64590222798bb761d5b6d8e72950