Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Detect Springboot Configprops Actuator

By kannthu

Low
Vidoc logoVidoc Module
#springboot#exposure
Description

What is the "Detect Springboot Configprops Actuator?" module?

The "Detect Springboot Configprops Actuator" module is designed to detect misconfigurations in Spring Boot applications. It specifically targets the Spring Boot Actuator endpoint "/configprops" and "/actuator/configprops". This module has a low severity level and was authored by that_juan_, dwisiswant0, and wdahlenb.

Impact

This module detects sensitive environment variables that may not be properly masked in the Spring Boot Actuator endpoint. If these variables are exposed, it could potentially lead to unauthorized access or information leakage.

How does the module work?

The module works by sending HTTP requests to the "/configprops" and "/actuator/configprops" endpoints of the target Spring Boot application. It then applies matching conditions to determine if the application is vulnerable to misconfiguration.

Matching conditions:

- The response body must contain the words "org.springframework.boot.actuate", "beans", and "contexts". - The HTTP response status must be 200. - The response headers must contain one of the following: "application/json", "application/vnd.spring-boot.actuator", or "application/vnd.spring-boot.actuator.v1+json".

If all of these conditions are met, the module will report a vulnerability.

Example HTTP request:

GET /configprops HTTP/1.1
Host: example.com

Note: The above example is a simplified representation of the HTTP request and does not include all headers and parameters.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/configprops/actuator/configprop...
Matching conditions
word: org.springframework.boot.actuate, beans,...and
status: 200and
word: application/json, application/vnd.spring...
Passive global matcher
No matching conditions.
On match action
Report vulnerability