id: springboot-jolokia info: name: Detects Springboot Jolokia Actuator author: DhiyaneshDK severity: low description: Springboot Jolokia Actuator is exposed. reference: - https://raw.githubusercontent.com/maurosoria/dirsearch/master/db/dicc.txt metadata: verified: true max-request: 2 shodan-query: title:"Eureka" tags: misconfig,springboot,exposure http: - method: GET path: - "{{BaseURL}}/jolokia" - "{{BaseURL}}/actuator/jolokia" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - '"config":{' - '"agentId":"' condition: and - type: word part: header words: - "application/json" - "application/vnd.spring-boot.actuator" - "application/vnd.spring-boot.actuator.v1+json" - "application/vnd.spring-boot.actuator.v2+json" - "application/vnd.spring-boot.actuator.v3+json" - "text/plain" condition: or - type: status status: - 200 # digest: 4b0a00483046022100a1fcc3c6ab82d2dafc4832840b08fb1802f24553649ed2d0ccbdced5801002fe022100c2a405deb9801dd0f7d028c16ddff0d1267ad9d5be87fff997885ed417e53bd5:922c64590222798bb761d5b6d8e72950