Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Detect Springboot Configprops Actuator" module is designed to detect misconfigurations in Spring Boot applications. It specifically targets the Spring Boot Actuator endpoint "/configprops" and "/actuator/configprops". This module has a low severity level and was authored by that_juan_, dwisiswant0, and wdahlenb.
This module detects sensitive environment variables that may not be properly masked in the Spring Boot Actuator endpoint. If these variables are exposed, it could potentially lead to unauthorized access or information leakage.
The module works by sending HTTP requests to the "/configprops" and "/actuator/configprops" endpoints of the target Spring Boot application. It then applies matching conditions to determine if the application is vulnerable to misconfiguration.
Matching conditions:
- The response body must contain the words "org.springframework.boot.actuate", "beans", and "contexts". - The HTTP response status must be 200. - The response headers must contain one of the following: "application/json", "application/vnd.spring-boot.actuator", or "application/vnd.spring-boot.actuator.v1+json".If all of these conditions are met, the module will report a vulnerability.
Example HTTP request:
GET /configprops HTTP/1.1
Host: example.com
Note: The above example is a simplified representation of the HTTP request and does not include all headers and parameters.