JavaMelody Monitoring Exposed
ID: java-melody-exposed
Severity: medium
Author: dhiyaneshDK,thomas_from_offensity
Tags: config,java,javamelody,misconfig
Description
Section titled “Description”JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to “View http sessions”. This can be used by an attacker to steal a user’s session.
YAML Source
Section titled “YAML Source”id: java-melody-exposed
info: name: JavaMelody Monitoring Exposed author: dhiyaneshDK,thomas_from_offensity severity: medium description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to "View http sessions". This can be used by an attacker to steal a user's session. reference: - https://www.acunetix.com/vulnerabilities/web/javamelody-publicly-accessible/ - https://github.com/javamelody/javamelody/wiki/UserGuide#16-security metadata: max-request: 2 tags: config,java,javamelody,misconfig
http: - method: GET path: - '{{BaseURL}}/monitoring' - '{{BaseURL}}/..%3B/monitoring'
matchers-condition: and matchers: - type: word words: - 'Monitoring JavaMelody on'
- type: status status: - 200# digest: 490a00463044022038f17a00939e5e6f80c80619d2ac4b18ecf97263aba19c9088673c29da8b2b6c02203db1bea34a5a1bb8aeac1c30732bcb8ed9025e5789802b25fa600ad01e480535:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/misconfiguration/java-melody-exposed.yaml"